Contact Us   |   Sign In   |   Register



  

Developing and Connecting Cybersecurity Leaders Globally

Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field. What can we do for you today?

If you currently hold certifications, you can earn CPE credits by attending chapter meetings, ISSA Web Conferences, reading or contributing an article to the ISSA Journal or volunteering for activities associated with putting on educational meetings or conferences.

Developing and Connecting Cybersecurity Leaders Globally

Through involvement with your chapter and access to ISSA International resources, you can turn that value statement into a roadmap for your career and a vision for driving our own destiny as cybersecurity professionals. This is a growing field with a shortage of qualified professionals to fill out our security teams. Together we can use our collective knowledge and expertise to enhance our stature and influence within our companies and organizations.

"As IT security professionals, we are often called upon to advise a wide spectrum of issues. By being fully engaged in a peer organization that shares information, our abilities are enhanced to adapt and respond appropriately.”
Mike Godsey, Central Ohio Chapter

Get the most out of your ISSA membership:

Log in for access to your chapter group and other members-only resources.

Thank You for Investing Your Time, Talent and Energies for the Betterment of ISSA and the Profession.

Your dedication pays off in thriving chapters, engaged members, lifelong professional connections and leadership skills. Log in for resources and materials to help you with chapter management, development and growth.

Joining the Metro Atlanta ISSA Chapter has been the best career move I have made on many fronts. As a chapter member I have expanded my network within the profession, widened my circle of influence and increased the breadth of my knowledge. As a chapter officer, I have received excellent training and experience in leadership, teaching and vendor relationships.”
Damien Suggs, Metro Atlanta

Whenever we can be of assistance, don’t hesitate to get in touch with our member services team, memberservices@issa.org , +1 (703) 382-8205 (local/international).

Partnering with ISSA International is a great opportunity to reach a targeted audience of information security professionals. Our members value your support and educational contributions in advancing the information security community.

Reasons companies that support ISSA reach a targeted audience of information security professionals

  • 81% of members come from companies with more than 1,000 employees
  • Web marketing programs reach all 10,000 active members around the world
  • 53% of members have an annual IS budget of more than $5 Million
  • 60% of members are CISSP Certified
  • 95% of members make, influence, or support purchasing decisions
  • Customized sponsorship packages designed to fit into your marketing strategy

Please contact Sean Bakke for a copy of the Media Kit.

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference



 

Copyright © 2017, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Benefits of Membership - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Benefits of Membership

Developing and Connecting Cybersecurity Leaders Globally

The ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Top 10 Reasons Cybersecurity Professionals Join ISSA

  • Build professional relationships
  • Keep up on developments in information security/risk/privacy
  • Content of chapter meetings
  • Professional development or educational programming offerings
  • Earn CPEs/CPUs
  • Learn practical/best practices solutions
  • Career information and employment opportunities
  • Advance the profession
  • Give back to the profession
  • Develop the next generation of cybersecurity professionals

Join today and start enjoying these ISSA member benefits!

Local Chapters

No other professional information security organization provides local networking and educational opportunities. The ISSA's157 chapters and its members can become your strongest allies when support is needed to get the job done. Visit the Chapter Directory to find a local chapter near you.

Professional Networking

Deepen existing business relationships and make new contacts on a regular and on-going basis. The networking opportunities ISSA provides goes beyond the exchange of business cards. As you attend local chapter meetings, become active on a committee or take a prominent leadership role, you’ll forge lasting ties with others all who have common professional interests and similar business concerns. These relationships will be rich, ongoing sources of inspiration and ideas. Learn what other IS professionals in your area are doing, and share your experiences and successes with colleagues in other ISSA chapters. Contacts developed through networking are extremely beneficial for benchmarking security practices and as a resource for you to validate security product functionality.

Education

The ISSA Chapter meetings, regional events, and the annual conference serve as vital educational and professional resources, offering in-depth and timely information about the information security industry. Meetings and events help you obtain skills and develop solutions to further your success. Educational opportunities include comprehensive workshops, seminars, knowledgeable guest speakers, and presentations on new technologies in the industry. ISSA also provides members with additional discounts to a spectrum of security conferences.

Advance Career

The networking and training you receive through the ISSA will provide a means to identify potential career opportunities and can get you known to those in hiring positions. The ISSA also provides updated job postings on its Web site. Plus, you can earn CPEs for various certifications by attending meetings and conferences sponsored by the ISSA.

Leadership Opportunities

Get involved. Promote information security in your company, industry, and your community. At the local Chapter and ISSA Board levels, you can participate, learn, and help spread the word about the vital importance of information security.

Recognition

Become an ISSA author or speaker. ISSA welcomes articles from members for publication on the ISSA Web site and in The ISSA Journal. Share your ideas about security, management, solutions, and innovation. Making a presentation about how you have applied security technology to address risks or ways you have adapted practices to solve problems helps other ISSA members and will identify you as an information security professional who is willing to share ideas and experiences. Plus, you can earn CISSP CPEs.

Access to Information

The ISSA Web site, http://www.issa.org/, provides a one-stop site for information professionals to quickly find useful information on security technologies and practices. The ISSA Journal is the Association's monthly journal that provides members with up-to-date technical, association, and chapter news.

How to Become a Member

Contact ISSA International Headquarters, phone: +1 (703) 382-8205 (local/international).
Join online or printout the membership application form and mail it to:

ISSA Inc.
1964 Gallows Road Suite 310
Vienna, VA. 22182

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### The ISSA Journal - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Interested in being a Friends of Authors mentor? See here for mentor guidance.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi


March 2019

Volume 17 - Issue 3

Feature articles include:

  • Application Security, Ethics, & Eight-Year-Olds | Matt Wilgus
  • The Quest for Visibility and Control in the Cloud | Yuri Diogenes
  • Countering Gender Disparity: Creating Anti-Predictions Using Data Science | Lori L. Cole
  • Lost Cryptographics Keys – Lessons from Gerald Cotton | Steve Kirby
  • Anonymous Digital Signatures | Phillip H. Griffin
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Application Security, Ethics, & Eight-Year-Olds - at no charge or Join Now and gain full access to the ISSA Journal.


February 2019

Volume 17 - Issue 2

Feature articles include:

  • California Dreaming – The Fight with the Federal Government over Technology | David R. Jackson
  • Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization | Philip Casesa
  • SIEM Implementation for School Districts Utilizing FOSS | Alex Smith
  • Automation of Business-Aware Incident Management | Mariusz Stawowski
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - California Dreaming – The Fight with the Federal Government over Technology - at no charge or Join Now and gain full access to the ISSA Journal.


January 2019

Volume 17 - Issue 1

Feature articles include:

  • The Post Exploitation Malware Era | Meir Brown
  • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckler
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • The Art of Pushing Left in Application Security | Kelley Bryant
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • Practical Approaches to Overcome Security Challenges in Cloud Computing: Part 2: Private Cloud | Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Post Exploitation Malware Era - at no charge or Join Now and gain full access to the ISSA Journal.


December 2018

Volume 16 - Issue 12

Feature articles include:

  • The Future of IT Risk Management Will Be Quantified | Jack Freund
  • Our Journey in Phishing Mitigation | Jennifer Kinney and Aurobindo Sundaram
  • The Impact of Cryptocurrency on Modern-Day Cybercrime | Michael Doran
  • Practical Approaches to Overcome Security Challenges in Cloud Computing | Seetharaman Jeganathan
  • Did GDPR Revoke the Digital Certificate? | Jeff Stapleton and Stephen Wu
  • Staring Down the Future of Cloud Computing | Tim O’Neal
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Future of IT Risk Management Will Be Quantified - at no charge or Join Now and gain full access to the ISSA Journal.


November 2018

Volume 16 - Issue 11

Feature articles include:

  • Malware: Cat and Mouse Forever? | Ken Dunham
  • Pulling Back the Privacy Curtain | Reg Harnish
  • Holistic Approach to Enhance Your Security Posture | Yuri Diogenes
  • A Look at the Espionage Act of 1917 for the Internet Age | Whitney Partridge and Nima Zahadat
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Malware: Cat and Mouse Forever? - at no charge or Join Now and gain full access to the ISSA Journal.


October 2018

Volume 16 - Issue 10

Feature articles include:

  • Cloud Cryptography and Key Management | Jeff Stapleton
  • Bookworm: A Threat Hunting Story | Carl Saiyed
  • Cloud Security Due Diligence | Chris Wolski
  • Security Measures That Help Reduce the Cost of a Data Breach | Mangaya Sivagnanam
  • Extracting Timely Sign-in Data from Office 365 Logs | Mark J. Lucas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Cloud Cryptography and Key Management - at no charge or Join Now and gain full access to the ISSA Journal.


September 2018

Volume 16 - Issue 9

Feature articles include:

  • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckle
  • The Brave Old New World of Privacy | Steven J. Ross and Robert G. Parker
  • On the Effects of Enterprise Security on Employee Privacy | Amn Rahman and Ashish Gehani
  • The Art of Pushing Left in Application Security | Kelley Bryant
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR - at no charge or Join Now and gain full access to the ISSA Journal.


August 2018

Volume 16 - Issue 8

Feature articles include:

  • Cryptocurrency and Corporate Security | Anthony J. Ferrante and D. Frank Hsu
  • Employee and Insider Data Breaches: Vulnerability or Threat Vector? | Barry S. Herrin
  • The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence | Michael R. Grimaila
  • Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age | Indrajit Atluri
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Cryptocurrency and Corporate Security - at no charge or Join Now and gain full access to the ISSA Journal.


July 2018

Volume 16 - Issue 7

Feature articles include:

  • Evolution of the Cybersecurity Framework | Alex Grohmann
  • A Multi-Pronged Approach to GDPR Compliance | Mark Shriner
  • Information Security Standards: Differences, Benefits, Impacts, and Evolution } Antonella Commiato and Michael Sturgill
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • PCAP Next Generation: Is Your Sniffer Up to Snuff? | Scott D. Fether
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Evolution of the Cybersecurity Framework - at no charge or Join Now and gain full access to the ISSA Journal.


June 2018

Volume 16 - Issue 6

Feature articles include:

  • S/MIME Certificate Management through DNS – DANE: A New Approach | Dena T. Bauckman
  • Rationalizing Behavioral Biometrics | Maria Schuett
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things | Mangaya Sivagnanam
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - S/MIME Certificate Management through DNS – DANE: A New Approach - at no charge or Join Now and gain full access to the ISSA Journal.


May 2018

Volume 16 - Issue 5

Feature articles include:

  • Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information | Sue Wang and Zach Furness
  • Orchestration and Automation in the Real World | Ken Dunham
  • Security Threats, Defenses, and Recommended Practices for Enterprise Mobility | Vincent Sritapan and Karim Eldefrawy
  • Securing a Medical Device | Dave Presuhn and Andrew Bomett
  • Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment | Curtis Campbell
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information - at no charge or Join Now and gain full access to the ISSA Journal.


April 2018

Volume 16 - Issue 4

Feature articles include:

  • Securing Complex Cyber-Physical Medical Device Landscapes | Ulrich Lang
  • The Dangers in Perpetuating a Culture of Risk Acceptance | Matt Wilgus
  • Using PKI to Build a Secure Industrial Internet of Things | Mike Nelson
  • The Two Faces of Innovation: From Safe and Dumb to Vulnerable Smart Products and Infrastructure | Steven W. Teppler
  • Cyber-Physical Intelligence | Tyson Brooks
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Securing Complex Cyber-Physical Medical Device Landscapes - at no charge or Join Now and gain full access to the ISSA Journal.



 

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Select Your Member Type

Developing and Connecting Cybersecurity Leaders Globally

Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.

Start Enjoying ISSA Member Benefits by Joining Today. Select Your Membership Type Below.

If you have any questions or problems with the online membership application, please contact memberservices@issa.org or call +1 (703) 382-8205 (local/international).

Already a member of the ISSA? Renew online!













Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Member Login
Welcome to the online community. Because of the built-in security features, you must first register and be approved before accessing many site sections. If you are not a member of the site yet, please register - we'd love you to be part of our online community. 

Forgot your password?
Click here to reset your password.

Haven't registered yet?
Click here to Register
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Copyright Information - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Copyright Information

ISSA is the registered trademarks of the Information Systems Security Association, Inc.

ISSA permits the use of any information on this site or in publications upon written request. If the information is used in later editions, we ask that you obtain updated versions of the information for those editions. Please indicate the ISSA copyright in any publications and include the following notice in the materials: "ISSA is the registered trademark of ISSA, Inc."

Use of the ISSA Logo is governed by the Logo Usage Policy. Please refer to this policy before making use of the ISSA Logo.

Any other trademarks are the property of their respective owners.

For more information or for clarification on the use of the above trademark, please contact the ISSA VP of Web Services.

Logo Use Policy

1.1 Trademarks and Copyrights of ISSA

Policy: Any variation on the ISSA logo must be avoided.

Intent: To protect the unifying function and legal identity of the ISSA logo.

Background: The logo has been in use for multiple purposes and in various forms. It is the intent of the board to standard use of the ISSA logo as defined here.

Approved/Updated: 10/20/2001

1.1.1 ISSA Brand

ISSA's logo represents a "brand" through which the Association is known to the world. As such it serves a unifying function by which all aspects of the Association become easily recognizable to the public and to our members. Establishing and sustaining a strong brand is essential if we are to think, act and be recognized as a global Association. In this process it is essential that our brand be strong, differentiating, and consistent around the world, and create a strong, positive awareness in the minds of our members and the general public.

To build a clear image of our global Association, we need to present consistent messages to the market. To accomplish this we need:

One name

ISSA chapters around the world will all do business under the name - ISSA (Information Systems Security Association) - wherever it is legally possible.

One organization

We will integrate our chapters around the world into a single Association.

One voice

To build a clear image in the minds of our targets, we must give consistent messages about who we are, how we work with our members and the value we demonstrate. This is our brand positioning.

One look

We will give all our communications around the world a consistent look that communicates our brand values.

Communicating our brand consistently in all our external communications and living it in our behavior will create the most favorable image of our Association in the minds of today's - and tomorrow's - successful business and information security leaders. A better-known name and a higher profile will make it easier to recruit as members high quality people who share our beliefs and characteristics.

1.1.2 ISSA Logo

The logo upon which we build our brand consists of four elements:

  1. the design,
  2. the color,
  3. the tagline and
  4. the typeface.

1.1.3 Policy

Any variation on the logo must be avoided, as this would reduce the unifying function of the brand. Changes to the logo might also have an affect on the legal standing of the logo.

1.1.3.1 Use of the Logo

All materials prepared by ISSA or any of its member chapters for presentation in a public forum, including web sites, brochures and flyers, and official organization business cards, should present the ISSA logo in its approved form.

1.1.3.1.1 Black and White Logo

When used for presentation in a black and white document format, it is permissible for the ISSA logo to be implemented in a grey-scale version, and in a two-color format for controlling expenses in publications. The logo is available in JPEG and GIF format for web site and document use, and in an EPS format for professional printing. The logo is also available in 4-color format, in 2-color format for reduced printing cost, and in gray-scale for black and white printing. The high-resolution version of the logo is preferred for use whenever possible.

1.1.3.2 Chapter Designation

Additional text and/or graphics may be used to differentiate chapter materials, but the official ISSA logo should always be used in addition to any chapter designation including use in any official publication and on Chapter web sites.

1.1.3.3 Use of the Logo by Other Organizations

The official ISSA logo may not be used by any other organization without the express written consent of the ISSA International Board. Permissible uses of the logo include use of the logo on materials for educational events sponsored by the ISSA and on-line links to the ISSA web site from official Sponsors at either the local or the international level. Links from other non-Sponsor organizations are permissible when approved by the Director of Communications.

1.1.3.4 Business Cards

The official ISSA logo must be used on official business cards for officers of the Association, including International Board members and local chapter officers. These business cards must be for Association business only, and must be ordered through the ISSA business office according to the format set forth by the International Board. Chapter logos may be included on chapter officer business cards at the request of the chapter.

1.1.3.5 Improper Use

The logo may not be used on non-Association materials, including web sites, brochures and non-Association business cards, without the express written consent of the ISSA International Board.

1.1.3.6 Grandfather Clause

Pre-existing materials (pamphlets, flyers, handouts, etc.) that do not conform to these guidelines may continue to be used until the supply has been exhausted. Any new supplies of these materials, however, should be created with the officially approved logo.

1.1.3.6.1 Exception to the Grandfather Clause

Pre-existing materials applies only to printed paperwork and objects to be handed out to existing and prospective members. It does not apply to web sites or to other electronic materials. Electronic materials should be altered to include the officially approved logo.

1.1.4 Products

From time to time, ISSA may acquire a variety of rights to products that were produced with member participation authorized by the International Board of Directors. Only the board has the authority to make commitments for ISSA with regard to these products or the processes that affects the status of the Association's rights. The International Board of Directors may appoint designees to conduct the routine negotiations with these products and processes.

1.1.5 Availability

The official logo will be made available to the Chapters in both presentation and printable format on the web site and through the International office personnel.

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Chapter Directory - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Chapter Directory
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### ISSA International Conference - Home Page - Information Systems Security Association ISSA 2017 International Conference
Contact Us   |   Print Page   |   Sign In   |   Register
ISSA International Conference - Home Page

 

Join us at the 2017 ISSA International Conference!

Conference Theme | Schedule at a Glance | Registration | Venue | Hotel Reservations | Sponsors | Partners


About the Conference Theme / #ISSAConf

Join us October 9-11, 2017 at the Sheraton Hotel & Marina in San Diego, California for solution oriented, proactive and innovative sessions focused on the Digital Danger Zone

Each day, cyber threats become increasingly intricate and difficult to detect. Over the past year, we saw that with the rise of device connectivity came boundless opportunities for malicious hackers to attack device vulnerabilities. No cyber security professional can become an expert on these digital dangers without continued efforts to educate themselves on the industry’s latest trends and technologies.

We look forward to welcoming you and over 800 of your colleagues and peers in San Diego as we discuss topics ranging from incident response to application security to business skills for the information security professional. Join us at the 2017 ISSA International Conference and we’ll help you navigate the Digital Danger Zone.




Detailed Schedule
Click here for session descriptions

 

 Registration Is Open!

Registration Rates July 15, 2017 - October 8, 2017

  • Members***:  Registration is $499 USD.
  • Non-Members:  Registration is $898 USD
  • Students: Full conference registration is $150 USD

On Site Rates after October 8, 2017

  • Members***:  Registration is $549 USD.
  • Non-Members:  Registration is $998 USD
  • Students: Full conference registration is $150 USD

Volunteer Rates

Conference registration includes:

  • All sessions on October 10-11; including keynotes, breakout sessions, breakfast, and lunch both days.
  • October 9 Opening Reception and Capture the Flag.
  • October 10 Party on the Flight Deck at USS Midway.
  • A certificate of attendance for continuing professional education (CPE), up to 16 hours available.
  • Exclusive access to the ISSA International Conference mobile app for conference information and networking. The app launces in September, watch your email for details!

 ***To access the Member Rate, you must be a dues-paying member of ISSA International in good standing. On the registration website, you will prompted to search for your member record using your member email address.

Group Discounts

Staff can assist you with your group registration of 5 or more attendees. Please contact Leah Lewis for a group discount code. Group discounts are as follows:

  • 5 or more attendees: 10% off
  • 10 or more attendees: 20% off

ISSA Conference Registration Cancellation Policy:

Substitution, cancellation, and refund requests must be submitted in writing and faxed to + 703 435 4390 or emailed to conference@issa.org.

  • For cancellations received through September 15, 2017, you may receive a full refund minus a $50 administrative fee.
  • For cancellations received between September 16, 2017 through October 8, 2017, fifty percent (50%) of the registration fee will be refunded.
  • Cancellations received on or after October 9, 2017 are nonrefundable. No refunds will be granted for nonappearances.
  • Substitutions are permitted at any time upon written notice from the original registrant.
  • Confirmation of refund request is the responsibility of the attendee.
  • Refunds will be processed no later than October 31, 2017.

Venue

San Diego Sheraton Hotel & Marina
1380 Harbor Island Dr.
San Diego, CA 92101

Click here to reserve your room at the San Diego Sheraton Hotel and MarinaThe daily rate is $199 plus state and local taxes. Reservations are available until September 15, 2017 or until the block sells out, whichever comes first. Space is limited.

ONLY make your reservation using this link or by calling the hotel directly. Hotel piracy is a new epidemic in the meeting and events industry. Scam companies may reach out notifying you that ISSA has contracted outside vendors to assist you with booking your hotel reservation. These fake companies then pressure you or your office staff to provide them with your credit card information to book your hotel stay directly through them. If you fall for their trick, you may arrive to the meeting location and there will not be a reservation under your name, but your fees for the room would have been stolen from your credit card. If you are contacted in such a manner, please capture as much information as possible and send their contact information to us at mjamborsky@issa.org. Do not make any reservations with another organization, as we will be unable to assist you with any issues that may arise. Only use official ISSA materials to register for the meeting and book your hotel stay – never work with a third party, book directly through our website or email communication. We take the privacy of our members very seriously. ISSA will never release your contact information to a third party housing vendor. Also keep in mind, this situation could happen to other similar societies or organizations for any meeting, conference, or convention you might attend.


Sponsor & Exhibitor Opportunities


Contact Sean Bakke (sean.bakke@issa.org) for sponsorship options and exclusive branding opportunities.

Thank You to ISSA's 2017 Conference Sponsors

Blue Diamond Sponsor


Diamond Sponsors

                    
      


Platinum Sponsors
     






Gold Sponsors
       
     
  


Silver Sponsors

>

 
  
        
  
 
      
 
   

Exhibitors

 Image_result_for_fidelis_cyb.png  
 

 

ISSA Education Foundation Annual Fundraiser Sponsors

   
           

Media Partners



Career Center Participants

                      
           

 

       



2016 International Conference Recap

Click here to access presentations from the 2016 conference



Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Member Login
Welcome to the online community. Because of the built-in security features, you must first register and be approved before accessing many site sections. If you are not a member of the site yet, please register - we'd love you to be part of our online community. 

Forgot your password?
Click here to reset your password.

Haven't registered yet?
Click here to Register
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Community Calendar - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Community Calendar
 
UpcomingUpcoming PastPast Month ViewMonth View

Here you can find out about upcoming events. Some events may allow for online registration and the ticket purchase. Click the event name to view more details and member discounts.

Event producers see the online co-marketing agreement for information on posting your event on the ISSA community calendar.

Are you entering information for an ISSA Chapter Event (one directly financed by the Chapter)? Please use the Chapter Event Form to enter your event and order materials.

Upcoming Events

Monday, April 1, 2019

 
InfoSec World 2019 Conference & Expo
4/1/2019 » 4/3/2019
Location: Lake Buena Vista, Florida   
InfoSec World 2019 Conference & Expo

Wednesday, April 10, 2019

 
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture
4/10/2019
Time: 1-2 PM EST
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

Wednesday, April 17, 2019

 
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle
4/17/2019
Time: 1-2 PM EST
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

Tuesday, May 7, 2019

 
4th Annual Healthcare Cybersecurity Summit
5/7/2019
Location: Fort Wayne, Indiana   
4th Annual Healthcare Cybersecurity Summit

Thursday, May 16, 2019

 
ISSA of Wisconsin - Annual Meeting and Conference
5/16/2019
Location: Milwaukee, Wisconsin   
 

Thursday, June 13, 2019

 
June CISO Executive Forum Boston, MA
6/13/2019 » 6/14/2019
Location: Woburn, Massachusetts   
June CISO Executive Forum Boston, MA
Displaying page 1 of 1
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Benefits of Membership - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Benefits of Membership

Home â”‚ CISO Executive Membership Committee â”‚ Guest Registration â”‚Member Benefits â”‚Membership Criteria 

ISSA CISO Executive Membership Program

The role of information security executive continues to be defined and redefined as the integration of business and technology as it evolves. While these new positions gain more authority and responsibility, peers must form a collaborative environment to foster knowledge and influence that will shape the profession.

The Information Systems Security Association (ISSA) recognizes this need and created the exclusive CISO Executive Membership program to give executives an environment to achieve mutual success. Connecting professionals to a large network of peers, valuable information, and top industry experts the program is a functional resource for members to advance personal and industry understanding of critical issues in information security.

Membership Benefits

  • Free registration at 4 CISO Executive Forums per year, including lodging for one night* and all meals at each Forum
  • Extensive networking opportunities with peers and experts on an on-going basis
  • Privileged access to onlinecommunity
  • Direct access to top subject matter experts through educational seminars
  • An effective forum for understanding and influencing relevant standards and legislation
  • A unified voice to influence industry vendors
  • Automatic CPE submission
  • The option of an additional ISSA International general membership for assignment to an individual on the CISO member’s staff** ($95+ value)
  • Basic Wisegate membership, including exclusive access to the Wisegate community and ISSA CISO Forum private group ($2,450 value)

*CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

**To register your staff person for ISSA membership, contact Sean Bakke with the person's name, title, and email address to process their membership

Membership Cost

$995 per 12-month period, plus ISSA Chapter dues.

Membership Application

Join online

For more information or to upgrade your existing ISSA membership, please contact Sean Bakke 781 569 6607

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Become A Sponsor - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Become A Sponsor
ISSA International offers lead generation and branding programs to help you make the most of your marketing budgets. For more information, please contact Sean Bakke, at sean.bakke@issa.org.

 

 2019 ISSA Media Kit

 2019 ISSA International Conference Media Kit available soon!

 Partnering with ISSA International is a great opportunity to reach a targeted audience of information security professionals. Our members value your support and educational contributions in advancing the information security community.
 
ISSA is the largest international, not-for-profit professional association in the information security community. ISSA has at least 134 chapters, reaching more than 10,000 security professionals in 70 countries. ISSA members are consistently recognized as experts on critical issues in all areas of information security, and the group is seen as an important resource for small businesses, global enterprises, and government organizations.


Reasons companies choose to support ISSA:

  • Reach a targeted audience of information security professionals
  • 81% of members come from companies with more than 1,000 employees
  • Web marketing programs reach all 11,000 active members around the world and Industry webinars reach an additional 34,000 prospective members
  • 53% of members have an annual IS budget of more than $5 Million
  • 60% of members are CISSP Certified
  • 95% of members make, influence, or support purchasing decisions
  • Customized sponsorship packages are designed to fit your marketing strategies

Sponsors can reach ISSA members through the various web marketing programs. 

The ISSA International Web Conference series is one of the most popular programs and is VERY well received by members.

Reach a focused core of ISSA CISO Executive Members through our CISO Executive Forums.

Please contact our Sponsorship team, at sponsor@issa.org for more information.

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Member Login
Welcome to the online community. Because of the built-in security features, you must first register and be approved before accessing many site sections. If you are not a member of the site yet, please register - we'd love you to be part of our online community. 

Forgot your password?
Click here to reset your password.

Haven't registered yet?
Click here to Register
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### About ISSA - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
About ISSA

Developing and Connecting Cybersecurity Leaders Globally.

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

        Join today!


Core Purpose

To promote a secure digital world.

  

Mission Statement

ISSA is a nonprofit organization for the information security profession committed to promoting effective cyber security on a global basis.

a)        Being a respected forum for networking and collaboration

b)        Providing education and knowledge sharing at all career lifecycle stages

c)         Being a highly regarded voice of information security that influences public opinion, government legislation, education and technology with objective expertise that supports sound decision-making

Core Values

Integrity: Evidenced by a reputation for trustworthiness earned through ethical, fair, transparent, and professional behavior.

Excellence: Evidenced by a commitment to expertise and experience in our field.

Respect: Evidenced in appreciation of the value of diverse perspectives and experience in promoting a culture of leadership and innovation in a global organization.

Strategic Goals

Goal A:  Leadership: ISSA will lead the global security community collaboration to protect society from security threats.

Goal B:  Program: ISSA will provide the profession with highly qualified practitioners and high quality education and training. 

Goal C:  Influence: ISSA will serve as a respected and trusted source and advisor on information security related technology, education, standards, and legislation. 

 

ISSA International By-Laws


Activities

Click Here to Join Today


What members are saying

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Contact ISSA - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Contact ISSA
  • Address

    Information Systems Security Association, Inc.
    1964 Gallows Road Suite 310
    Vienna, VA. 22182

  • Fax: (703) 356-7096

Management Contacts

  • Member Services

    Sean Bakke

    +1 (703) 382-8205 (local/international)
    Send email »

  • Sales / Sponsorships

Sean Bakke    

                       +1 (703) 382-8205 (local/international)

           Send email »

.

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Information Systems Security Association

Contact Us   |   Sign In   |   Register



  

Developing and Connecting Cybersecurity Leaders Globally

Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field. What can we do for you today?

If you currently hold certifications, you can earn CPE credits by attending chapter meetings, ISSA Web Conferences, reading or contributing an article to the ISSA Journal or volunteering for activities associated with putting on educational meetings or conferences.

Developing and Connecting Cybersecurity Leaders Globally

Through involvement with your chapter and access to ISSA International resources, you can turn that value statement into a roadmap for your career and a vision for driving our own destiny as cybersecurity professionals. This is a growing field with a shortage of qualified professionals to fill out our security teams. Together we can use our collective knowledge and expertise to enhance our stature and influence within our companies and organizations.

"As IT security professionals, we are often called upon to advise a wide spectrum of issues. By being fully engaged in a peer organization that shares information, our abilities are enhanced to adapt and respond appropriately.”
Mike Godsey, Central Ohio Chapter

Get the most out of your ISSA membership:

Log in for access to your chapter group and other members-only resources.

Thank You for Investing Your Time, Talent and Energies for the Betterment of ISSA and the Profession.

Your dedication pays off in thriving chapters, engaged members, lifelong professional connections and leadership skills. Log in for resources and materials to help you with chapter management, development and growth.

Joining the Metro Atlanta ISSA Chapter has been the best career move I have made on many fronts. As a chapter member I have expanded my network within the profession, widened my circle of influence and increased the breadth of my knowledge. As a chapter officer, I have received excellent training and experience in leadership, teaching and vendor relationships.”
Damien Suggs, Metro Atlanta

Whenever we can be of assistance, don’t hesitate to get in touch with our member services team, memberservices@issa.org , +1 (703) 382-8205 (local/international).

Partnering with ISSA International is a great opportunity to reach a targeted audience of information security professionals. Our members value your support and educational contributions in advancing the information security community.

Reasons companies that support ISSA reach a targeted audience of information security professionals

  • 81% of members come from companies with more than 1,000 employees
  • Web marketing programs reach all 10,000 active members around the world
  • 53% of members have an annual IS budget of more than $5 Million
  • 60% of members are CISSP Certified
  • 95% of members make, influence, or support purchasing decisions
  • Customized sponsorship packages designed to fit into your marketing strategy

Please contact Sean Bakke for a copy of the Media Kit.

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference



 

Copyright © 2017, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### ISSA International Web Conferences - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
ISSA International Web Conferences


 

ISSA International Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of ISSA members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA International Web Conference Committee.

CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our online quizzes and surveys are powered by SurveyGizmo survey software.

Click here if you are interested in sponsoring an ISSA International Web Conference

Click here for On-Demand ISSA Web Conferences 
Upcoming Webinar Schedule

Cancelled :October - Social Engineering


2-Hour Live Event: Tuesday, October 24th, 2017
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here to register.

Overview:  Due to storm Harvey related schedule impacts, this webinar is cancelled - will reschedule.

While the public and media image of hacking remains rooted in sophisticated technical abilities and seemingly magical coding, the fact remains that people continue to be the biggest threat to information security worldwide. From phishing to impersonation to spoofing, the market for social based attacks is only growing more alluring to malicious actors. In this web conference, we examine the latest trends and share best practices of those that are working to turn the tide in the battle of the human element.
  

November - Secondary Costs of Intrusions


2-Hour Live Event: Tuesday, November 28th, 2017
Start Time: 9:00 a.m. US-Pacific/ 12:00 noon US-Eastern/ 5:00 p.m. London

Click here to register.

Overview:

Data breaches are costly affairs. Beyond the impact of lost customers, regulatory fines and remediation, there are a multitude of additional costs to businesses. From notification costs to legal fees to public relations mending, the totals add up quickly, with the average cost of a breach in 2016 estimated to be over $7 million. In this web conference we will examine various secondary intrusion costs and provide expert advice on how to reduce your risk exposure.
  
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Special Interest Groups - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Special Interest Groups

ISSA’s Special Interest Groups (SIG) give those interested in a particular topic an opportunity to collaborate, discuss and focus on resources within the community.

Already a member of the ISSA? Click on the below links of the Specal Interest Group site you wish to access.

If you are not currently an ISSA member you can either join ISSA to get the full benefits of membership or we do have a Special Interest Group only (no charge) login option. Click here to sign up for either of these options. You can then log in to the SIG site you wish to join, view resources and contribute to the discussion - we'd love you to be part of our online community!

Looking for an archived webinar? Visit our SIG Webinar On Demand page.

Security Awareness
The Security Awareness Group site is a repository for sharing knowledge, experience, methodologies regarding IT Security Education, Awareness and Training Programs. To join this group please login to your account, go to the group site and click the join here link.
Upcoming Events

Group Site
Women in Security
Mission: Connecting the World, One Cybersecurity Practitioner at a Time.
Vision: The WIS SIG is committed to developing women leaders globally, building a stronger cybersecurity community fabric, and enabling success across the globe.

Upcoming Events

Group Site

Healthcare
Vision: Establish and maintain collaborative models for information security within healthcare organizations.
Mission: Drive collaborative thought and knowledge-sharing for information security leaders within healthcare organizations.
Upcoming Events

Group Site

Financial
Mission: To promote knowledge sharing and collaboration between information security professionals and leaders within financial industry organizations.
Goals: To create a community of colleagues in the financial industry sector, establish regular meetings for communications and interactions, and encourage real-time collaboration.

Upcoming Events

Group Site

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### The ISSA Journal - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Interested in being a Friends of Authors mentor? See here for mentor guidance.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi


March 2019

Volume 17 - Issue 3

Feature articles include:

  • Application Security, Ethics, & Eight-Year-Olds | Matt Wilgus
  • The Quest for Visibility and Control in the Cloud | Yuri Diogenes
  • Countering Gender Disparity: Creating Anti-Predictions Using Data Science | Lori L. Cole
  • Lost Cryptographics Keys – Lessons from Gerald Cotton | Steve Kirby
  • Anonymous Digital Signatures | Phillip H. Griffin
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Application Security, Ethics, & Eight-Year-Olds - at no charge or Join Now and gain full access to the ISSA Journal.


February 2019

Volume 17 - Issue 2

Feature articles include:

  • California Dreaming – The Fight with the Federal Government over Technology | David R. Jackson
  • Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization | Philip Casesa
  • SIEM Implementation for School Districts Utilizing FOSS | Alex Smith
  • Automation of Business-Aware Incident Management | Mariusz Stawowski
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - California Dreaming – The Fight with the Federal Government over Technology - at no charge or Join Now and gain full access to the ISSA Journal.


January 2019

Volume 17 - Issue 1

Feature articles include:

  • The Post Exploitation Malware Era | Meir Brown
  • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckler
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • The Art of Pushing Left in Application Security | Kelley Bryant
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • Practical Approaches to Overcome Security Challenges in Cloud Computing: Part 2: Private Cloud | Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Post Exploitation Malware Era - at no charge or Join Now and gain full access to the ISSA Journal.


December 2018

Volume 16 - Issue 12

Feature articles include:

  • The Future of IT Risk Management Will Be Quantified | Jack Freund
  • Our Journey in Phishing Mitigation | Jennifer Kinney and Aurobindo Sundaram
  • The Impact of Cryptocurrency on Modern-Day Cybercrime | Michael Doran
  • Practical Approaches to Overcome Security Challenges in Cloud Computing | Seetharaman Jeganathan
  • Did GDPR Revoke the Digital Certificate? | Jeff Stapleton and Stephen Wu
  • Staring Down the Future of Cloud Computing | Tim O’Neal
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Future of IT Risk Management Will Be Quantified - at no charge or Join Now and gain full access to the ISSA Journal.


November 2018

Volume 16 - Issue 11

Feature articles include:

  • Malware: Cat and Mouse Forever? | Ken Dunham
  • Pulling Back the Privacy Curtain | Reg Harnish
  • Holistic Approach to Enhance Your Security Posture | Yuri Diogenes
  • A Look at the Espionage Act of 1917 for the Internet Age | Whitney Partridge and Nima Zahadat
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Malware: Cat and Mouse Forever? - at no charge or Join Now and gain full access to the ISSA Journal.


October 2018

Volume 16 - Issue 10

Feature articles include:

  • Cloud Cryptography and Key Management | Jeff Stapleton
  • Bookworm: A Threat Hunting Story | Carl Saiyed
  • Cloud Security Due Diligence | Chris Wolski
  • Security Measures That Help Reduce the Cost of a Data Breach | Mangaya Sivagnanam
  • Extracting Timely Sign-in Data from Office 365 Logs | Mark J. Lucas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Cloud Cryptography and Key Management - at no charge or Join Now and gain full access to the ISSA Journal.


September 2018

Volume 16 - Issue 9

Feature articles include:

  • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckle
  • The Brave Old New World of Privacy | Steven J. Ross and Robert G. Parker
  • On the Effects of Enterprise Security on Employee Privacy | Amn Rahman and Ashish Gehani
  • The Art of Pushing Left in Application Security | Kelley Bryant
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR - at no charge or Join Now and gain full access to the ISSA Journal.


August 2018

Volume 16 - Issue 8

Feature articles include:

  • Cryptocurrency and Corporate Security | Anthony J. Ferrante and D. Frank Hsu
  • Employee and Insider Data Breaches: Vulnerability or Threat Vector? | Barry S. Herrin
  • The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence | Michael R. Grimaila
  • Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age | Indrajit Atluri
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Cryptocurrency and Corporate Security - at no charge or Join Now and gain full access to the ISSA Journal.


July 2018

Volume 16 - Issue 7

Feature articles include:

  • Evolution of the Cybersecurity Framework | Alex Grohmann
  • A Multi-Pronged Approach to GDPR Compliance | Mark Shriner
  • Information Security Standards: Differences, Benefits, Impacts, and Evolution } Antonella Commiato and Michael Sturgill
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • PCAP Next Generation: Is Your Sniffer Up to Snuff? | Scott D. Fether
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Evolution of the Cybersecurity Framework - at no charge or Join Now and gain full access to the ISSA Journal.


June 2018

Volume 16 - Issue 6

Feature articles include:

  • S/MIME Certificate Management through DNS – DANE: A New Approach | Dena T. Bauckman
  • Rationalizing Behavioral Biometrics | Maria Schuett
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things | Mangaya Sivagnanam
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - S/MIME Certificate Management through DNS – DANE: A New Approach - at no charge or Join Now and gain full access to the ISSA Journal.


May 2018

Volume 16 - Issue 5

Feature articles include:

  • Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information | Sue Wang and Zach Furness
  • Orchestration and Automation in the Real World | Ken Dunham
  • Security Threats, Defenses, and Recommended Practices for Enterprise Mobility | Vincent Sritapan and Karim Eldefrawy
  • Securing a Medical Device | Dave Presuhn and Andrew Bomett
  • Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment | Curtis Campbell
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information - at no charge or Join Now and gain full access to the ISSA Journal.


April 2018

Volume 16 - Issue 4

Feature articles include:

  • Securing Complex Cyber-Physical Medical Device Landscapes | Ulrich Lang
  • The Dangers in Perpetuating a Culture of Risk Acceptance | Matt Wilgus
  • Using PKI to Build a Secure Industrial Internet of Things | Mike Nelson
  • The Two Faces of Innovation: From Safe and Dumb to Vulnerable Smart Products and Infrastructure | Steven W. Teppler
  • Cyber-Physical Intelligence | Tyson Brooks
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Securing Complex Cyber-Physical Medical Device Landscapes - at no charge or Join Now and gain full access to the ISSA Journal.



 

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### ISSA Privacy Notice - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
ISSA Privacy Notice

ISSA Privacy Notice

The Information Systems Security Association, Inc., ("ISSA" or "Association") has created this privacy statement ("Policy") in order to demonstrate our firm commitment to the privacy and the confidentiality of our members. We endeavor to comply with all laws pertaining to privacy in the countries in which we operate. We also voluntarily endeavor to adhere to the Safe Harbor framework developed by the U.S. Department of Commerce in consultation with the European Union. The following discloses the information gathering and dissemination practices of the ISSA.

Information Collection and Storage

Collection of Personal Information

When you request membership, we ask that you provide information that personally identifies you (Personal Information), and allows us to process your membership or to contact you. This information includes your name, work and home mailing address, company for which you work, phone numbers, e-mail addresses, your credit card information if submitted for payment purposes, and other information to assist us in keeping you informed as to activities of the Association and your rights and privileges as a member.

Storage of Personal Information

This information is retained in the active database while you are a member, and for up to a year afterwards in case you rejoin the Association during that time. After that period of time, it is archived for historical purposes and is no longer accessible through the normal reporting methods.

Credit card information obtained for purposes of membership processing is not stored with the membership record or available to other association members. Association staff retain this information separately for internal processing only.

Information Use

A discussion of the specific responsibilities of the ISSA staff, Board and Chapter officers can be found below.

ISSA International Staff

The Association’s International Staff use this information to maintain your membership, and to provide you with standard Association communications and privileges.

ISSA International Board

The International Board of the Association has access to your contact information as a part of its oversight responsibilities.

Local Chapter

One of our most significant responsibilities and duties as an Association is to encourage professional networking and the sharing of experiences and information between our members. The local ISSA chapter serves a critical role in this activity and we encourage all members to take part in their local chapters. In support of this activity, we share local member contact information with members who have taken on the responsibility of starting a new chapter and to facilitate communications between the local members. We also provide local chapter officers with contact information of members who are not affiliated with the local chapter to support their efforts in getting local members to participate in their local activities. We do, however, recognize that members do not wish to have their contact information spread indiscriminately through the Association or outside of it. We therefore publish contact information only to those in the Association and the Local Chapter with a legitimate need to know.

Educational Activities

A significant focus of our charter and activities is the education and development of our members. As a part of this effort, we seek to bring educational opportunities to our members. We likewise seek every opportunity to make our members aware of tools and services that might benefit them and their employers. We therefore solicit, from the vendors that support ISSA, information on available tools, services and educational opportunities and communicate these to our membership.

In performing this service, we do not share the member contact information with any other organization or company except to conduct Association business, if directed to do so by a member, required by law, or to prevent a member from violating the terms of use of the Association’s resources.

Member Benefits

As a special service to our members, we continually attempt to improve the benefits provided to our members. These benefits include special discount offerings of goods and services. To provide these benefits, it is sometimes necessary to share our member information with selected vendors for the provision of such services. However, this information is provided under agreements that prohibit them from using the information for any other purpose, and under which your privacy must be protected.

CHOICE - Third-Party Goods and Services

We also provide an additional service, permitting vendors of related information security goods and services to make you aware of their offerings. However, we require your consent to include you in this service. We provide an Opt-In option on the registration and renewal forms. If you choose to Opt-In, we sell to vendors a one-time use of the mailing addresses through an independent mailing house. The vendor does not receive the mailing list and the mailing house is contractually bound to us to use that mailing list only once.

If you choose to not Opt-In, your direct mail contact information will not be sold in this manner and you will not receive these mailings. All Local Chapters are also required to honor your choice to not Opt-In. Please note that your e-mail address is never sold as a part of this process, and you will not receive unsolicited e-mail offerings as a result of any sale of your mailing address.

Choosing to not participate in the Opt-In process will not affect mailings and communications submitted to you by ISSA, including the ISSA Journal, the online E-News, and direct mail of special educational offerings sent to you by ISSA.

The ISSA Webcast Policies

The information in this webcast has not been subjected to any formal testing by the Information System Security Association (ISSA). The implementation, use and/or selection of software, hardware, or procedures presented within this webcast and the results obtained from such selection or implementation is the responsibility of the reader.

Information will be presented as technically correct as possible, to the best knowledge of the author. If the reader intends to make use of any of the information presented in this webcast, please verify and test any and all procedures selected. Technical inaccuracies may arise from printing errors, new developments in the industry and/or changes or enhancements to components, either hardware or software.

The opinions expressed by the sponsors who contribute to The ISSA Webcast are their own and do not necessarily reflect the official policy of ISSA.

The webcasts should be within the scope of information systems security, and should be a subject of interest to the members and based on experience. Upon broadcast, it becomes the property of ISSA and may be distributed to, and used by, all of its members. Webcast registration information may be made available to webcast sponsors.

ISSA is a not-for-profit, independent corporation and is not owned in whole or in part by any manufacturer of software or hardware. All corporate information security professionals are welcome to join ISSA. For information on joining ISSA and for membership rates, see www.issa.org.

All product names and visual representations published in this webcast are the trademarks/registered trademarks of their respective manufacturers.

Web Site Access

We use an assigned site member name and a password chosen by our members to permit them access to our restricted membership services on-line. We use your IP address as recorded in our site logs only as needed to help diagnose problems with our server, and to administer our Web site. Site usage information is not analyzed for other purposes or shared with other sites.

Cookies

We use temporary cookies to save access permissions for our members so that they do not have to log in multiple times as they attempt to access restricted pages during a single online session. These cookies expire with the current session, do not contain any personal information, and are not shared with any other web site.

We accept membership applications and renewals over the Internet through a secured SSL link. No personal or credit card information submitted for this purpose is stored upon the web server.

Access

We provide members with the means to ensure that their personal information is correct and current. Members may review and update this information at any time in the "Members Only" section by following the "Your Member Information Update Form" link. If this information is found to be in error, members may update the information on the member update form.

Links

This site contains links to other sites providing information security updates or educational services which we consider to be of benefit to our members. ISSA is not responsible for the privacy practices or the content of such Web sites.

Public Forums

This site will make a limited number of chat rooms, forums, message boards, and/or news groups available to ISSA members for discussion of information security issues and ISSA business. Please remember that any information that is disclosed in these areas becomes public information and you should exercise caution when deciding to disclose your personal information in that forum.

Security

This site has security measures in place to protect against the loss, misuse and alteration of the information under our control.

The site is audited on a periodic basis to attempt to keep it up to date with good security practices, and protective measures are implemented on the site hosts. Sections of the site are reserved for ISSA members only and are protected from access by other individuals. Personal member information is not stored on the web server. All such information is stored only on protected internal servers at the host site.

Corrections & Updates

Members may request changes to their membership and Opt-In information by submitting these changes in one of three ways:

Online

Use the Update Profile form.

Email

member@issa.org

Postal mail

Information Systems Security Association
11130 Sunrise Valley Drive, Suite 350
Reston, Virginia 20191

Changes to this Policy

The Association may amend this Policy from time to time. If we make any substantial changes to the way we use your Personal Information we will notify you by e-mail and a prominent notification on our website.

Enforcement

If you have any questions about this privacy statement, the practices of this Web site, or your dealings with it, or have a concern that these privacy provisions are being violated in some way, please contact the ISSA. Concerns about privacy violations at either the International or Local Chapter level should be sent to either the ISSA Chief Operating Officer or ISSA Director of Marketing and Communications.

Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Member Login
Welcome to the online community. Because of the built-in security features, you must first register and be approved before accessing many site sections. If you are not a member of the site yet, please register - we'd love you to be part of our online community. 

Forgot your password?
Click here to reset your password.

Haven't registered yet?
Click here to Register
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Member Login
Welcome to the online community. Because of the built-in security features, you must first register and be approved before accessing many site sections. If you are not a member of the site yet, please register - we'd love you to be part of our online community. 

Forgot your password?
Click here to reset your password.

Haven't registered yet?
Click here to Register
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### ISSA International In Person Events - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
ISSA International In Person Events

Gather with ISSA Members and the larger cybersecurity community at these events that focus on advancing individual growth, managing technology risk and protecting critical information and infrastructure.

 

2018 Conference Home Page 
October 17-18, 2018
Georgia World Congress Center
Atlanta, Georgia, USA

Quarterly Executive Events for VP and C-Level Information Security Officers

 

Community Search
Sign In


Calendar

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference

6/13/2019 » 6/14/2019
June CISO Executive Forum Boston, MA





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### #####EOF##### ISSA Patron Sponsors - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
ISSA Patron Sponsors
ISSA International would like to thank our Patron Sponsors for their generous support. Your contributions to the information security community are greatly appreciated!
 

Become an ISSA Sponsor

If you would like to join these companies in sponsoring ISSA International, please contact:

ISSA Sponsorship Team - sponsor@issa.org

Phone: (703) 382-8196

2019 ISSA Media Kit

2019 ISSA International Conference Media Kit available soon!


Diamond

     BOMGAR.jpg.jpg   
               
                Spikes_logo_2015_solid.jpg 

 

               symantec.jpg                 


 

 

Platinum

fortinet.png
InteliSecure_w_Tag.jpg
MediaPro_LogowithTagline_blu.png

PhishLine-logoTLR-nocom.jpg

PKWARE_Logo.jpg

opendns.jpg
Gold


baydynamics.png
esentire-logo.png

Infoblox_logo_tagline.jpg   
 Pulse-Secure-Logo-Large.jpg TenableLogo_FullColor_CMYK-0.png 
 
Silver

 DT_logo_onwhite_noBG.PNG  illumio_logo_mark_color_fina.jpg  
bit9.png
Cimtrak_Logo_NewClear.jpeg

 ContactSingapore.jpg
              docauthority.png           EsetEST-logo-VerticalStckd-B.png    Forum-System-Vertical-Center.jpg
KeeperLogo.jpeg.jpg  MNJ_Technologies.jpg   
 qualys-194.png  sunera.png  secunia-logo.png
 ThreatTrack-Logo-4C.jpg  Veracode.jpg  

Additional Sponsors


 BlueTalon-Logo-Small.png  
ProofPoint-logo-2015.png
ProsoftSystemsIntl.png
Verodin_FrontHorz_RevLogo_Ta.jpg zscaler-logo.png    













SecurityInnovationlogo2016.png


great-bay-logo.png url.png SAC-logo.png Nexum-logo.png
inspiredlearning.jpg.jpg SergeantLaboratories-logo.png observIt.jpg Clearswift-logo.png
Community Search
Sign In


Calendar

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference

6/13/2019 » 6/14/2019
June CISO Executive Forum Boston, MA





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### #####EOF##### Friends of Authors - Mentor Guidance - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Friends of Authors - Mentor Guidance

 

“Friends of Authors” Mentor Guidance

Mentors will help authors get an article written, from initial ideas through final draft to be submitted to the peer-review board.

Writing is a process that varies with the individual; it takes patience and perseverance on your part and the author’s. Remind him* that your mentoring activity is intended to help him in his article development—not write it for him—and that articles will be subject to the same criteria and go through the same review process as with any other submitted article.

Here are some hints to help in your author support:

  • Determine where the author is in the writing process.  Listen for clues as to areas of concern or difficulty.
  • Some potential authors want to know what they should write about. For an article to be useful, the writer has to determine what he is interested in, what he knows, and how a topic would support him in his work or in something he is interested in learning about. He should also determine how the article would help other ISSA Journal readers in their work.
  • The author should first formulate an outline that captures the main ideas he is trying to convey to the reader. Encourage the author to share the initial outline with you and seek feedback to assure that it is concise and understandable. Only after completing the outline should the author begin to populate it to generate the first draft.
  • Warn the author not to get caught in “analysis paralysis.” This occurs when the author tries repeatedly to write the perfect paragraph and wastes hours or days. Instead, encourage the author to slowly populate each of the main points in the outline and save the fine smoothing until the end.
  • Suggest the author collect several references that can be cited in the article. Remind him that this is to both support his main points and also to help readers who want to learn more about the topic. Remind the author that articles should include 8 to 10 references or more.
  • Make sure the author includes sections such as an abstract, a brief introduction at the beginning and a summary at the end. The abstract should include "this article discusses..." or some such: the thesis to be developed.
  •  Ask the author to read their article draft aloud to themselves or to have their colleague to read it aloud in order to catch awkward sentences or phrases.
  • Explain the review process and that the editor will help with responding to reviewer’s comments.

 

Thank you for stepping into the role as mentor.

Please contact Thom Barrie – thom.barrie@issa.org â€“ if you are interested in being a mentor.

_________________________________________________

* Note: Pronoun agreement is enforced in the ISSA Journal: no singular "they." Either cast subject as plural or choose "he/his," "she/her," or "he or she / his or hers.”

Community Search
Sign In


Calendar

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference

6/13/2019 » 6/14/2019
June CISO Executive Forum Boston, MA





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### #####EOF##### Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Member Login
Welcome to the online community. Because of the built-in security features, you must first register and be approved before accessing many site sections. If you are not a member of the site yet, please register - we'd love you to be part of our online community. 

Forgot your password?
Click here to reset your password.

Haven't registered yet?
Click here to Register
Community Search
Sign In


Calendar

4/1/2019 » 4/3/2019
InfoSec World 2019 Conference & Expo

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### #####EOF##### Renew Online - Information Systems Security Association
Contact Us   |   Print Page   |   Sign In   |   Register
Renew Online

Online Renewal for Existing or Expired ISSA Members

Note: past membership accounts are never deleted. Please contact us if you need help logging in. Not yet a member of the ISSA? Join online

Renew by logging in

Log in, click on the "membership info" tab on the right side of the page and follow the links to securely renew your membership. If you have an expired account or need assistance in accessing the renewal page, please contact customercare@issa.org

  • You can update your membership information (address, job title, employer, privacy settings, etc.) either before or after renewal. To edit, click on "manage profile” located on the right side under "my ISSA profile”. Click on "edit bio” to make and save your changes. To return to the renewal page, click on "membership info” and then click on the "securely renew your membership”
  • When renewing you will select a type of membership. Click here for details on available membership types and criteria
  • To select your chapter(s), click the plus sign next to chapter dues to select the chapter(s) you would like to join/rejoin. A list of chapters can be found on the chapter directory page.
  • Enter billing and credit card Information. Make sure to complete the required fields indicated by the red asterisks
  • Accept the terms of use, including the ethic policy
  • You are renewed!! Continue to enjoy your ISSA membership, click on the chapter directory to find a link your local chapter’s page with meeting and events. www.issa.org will give your access to events, publication and education through the international organization

Considering changing your membership type?

Read more about membership types.

Questions or Problems?

For assistance, please contact customercare@issa.org

Community Search
Sign In


Calendar

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference

6/13/2019 » 6/14/2019
June CISO Executive Forum Boston, MA





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### ISSA Journal Call for Articles - Information Systems Security Association ISSA Journal Call for Articles
Contact Us   |   Print Page   |   Sign In   |   Register
ISSA Journal Call for Articles

 

The ISSA Editorial Advisory Board seeks article submissions from information security professionals throughout the industry. Security experts in the enterprise, academia, and government are encouraged to share their expertise to the advancement of our industry. ISSA members and non-members are welcome to contribute. Please submit articles to the ISSA Journal Editor and review in advance the Editorial Guidelines. Include the copyright release and submission checklist with your article. Note that accepted articles may be eligible for CPE credits.

Note: If you have an infosec topic in mind that does not align with the monthly themes, please submit. All articles will be considered.


The Open Forum

The Open Forum is a vehicle for individuals to provide opinions or commentaries on infosec ideas, technologies, strategies, legislation, standards, and other topics of interest to the ISSA community. Open Forum articles are not intended for reporting news; they must provide insight, opinion, or commentary to initiate a dialog as to be expected from an editorial. The views expressed in this column are the author’s and do not reflect the position of the ISSA, the ISSA Journal, or the Editorial Advisory Board. Columns should be 800 words maximum and include a title, a short bio, and a photo.


2019

January: Best of 2018


February: Legal & Public Policy

Security professionals are literally on the front lines of laws relating to privacy and accountability. What is technically correct or secure may not be what is required according to law. There are new laws such as the GDPR that drastically affect our businesses when they come into force. Every security incident has different factors that guide an appropriate response to include impact to the company, the individuals affected, and whether it is reportable or not. Other countries may have laws that affect us or may suggest directions that new laws are going that we will have to adapt to. We are looking for authors to share their experiences and knowledge in managing the impact of law on our profession as well as the wider impacts to the public.


March: Cloud

Although cloud technologies have been around for a while, we still find ourselves struggling for answers to some basic questions. Where is the data actually being stored? Is it really possible to be secure in the cloud? How can we ensure that we are in compliance with the growing number of regulations that are being created to help protect data and privacy? During our quest for information as we move to a cloud-first policy or cloud-only policy organization, imagine what it would be like if we had the services of a "cloud whisperer." The ISSA Journal is looking for writers who are fluent in "cloud." We need your input, ideas, experience, and observations as to what works and what doesn't. Let us know what solutions are available, what standards should be applied, and what considerations a security practitioner should keep in mind when it comes to life in the cloud.


April: Infosec Basics

We’ve come a long way from information security consisting of a short list of access controls on an edge firewall, manually performed daily log reviews, and good coding practices. While the core tenets of confidentiality, integrity, and availability are still relevant, the breadth of today’s information security basics now cover a large number of disciplines. Technical knowledge for domains such as system administration and network security have remained necessary but matured. Knowledge around other key areas has also become required: topics like cloud management, scripting and coding best practices in new languages, security monitoring automation, and risk management. Working your way up from the bottom requires learning dedicated skills and how those basics fit into the overall picture. Help others understand how that bigger picture is developed!


May: Cryptography

Today, multiple cryptographic technologies lie at the center of our daily interactions. In the corporate world, cryptography is a critical component of any mature corporate information security program to secure information that we access, process, transport, store, or retrieve. This is also true in personal lives, where we rely upon cryptography to protect our daily communications, entertainment, financial transactions, and transportation. We are seeking articles on all aspects of cryptography. Topics of interest include, but are not limited to, the theory, technology, and application of blockchain technology, cryptocurrency, digital signature, digital rights management, email security, hashing, payment systems, personnel identifiers, quantum cryptography, and virtual private networks. How does your organization employ cryptography technologies and insure information security? What are the difficulties when implementing new cryptographic policies and procedures? How do you remain current on new cryptographic developments and technologies? How do you evaluate new cryptographic security technologies?


June: Privacy

The 2016 US election and Facebook/data analytics scandal revealed that average people truly don’t know their rights in regards to information and data privacy and the privacy we give up and as we engage more and more with the Internet. Information privacy is an intertwined relationship between collecting, protecting, and sharing data, technology, and the expectation that our privacy is protected. Every data breach, engagement with social media, search history, smart appliances, and even the much loved Amazon Echo reveal that our control over privacy has weakened even though privacy rights have grown stronger. Privacy has emerged as the most significant consumer protection issue. How little or how much do we have? What are our privacy rights? Should we demand more? Are we giving up too much privacy by living life on the internet?


July: Internet of Things

As our world evolves it's only natural that our interactions with machines and other inanimate objects become more complex. The Internet of things is quickly transforming into the network of things, possibly making our lives better, faster, and more efficient. However, the increased connections open up new opportunities for cyber criminals to wreak havoc (think medical devices, utility grids, automobiles, etc.). Are we ready to meet the growing challenges in designing and delivering secure, impenetrable devices? What are the ramifications of a device that may be mass produced at low cost and more than likely not have a means to be patched or updated in the event a flaw or vulnerability is discovered. How do we prepare for and guide our organizations in the safe adoption of this wave of new technology? How might our privacy be impacted by remote sensing devices in our homes? If you are an information security thought leader who is willing to lead the discussion on how IoT technology can become a trusted participant in our information world, we would like to hear from you.


August: The Toolbox: Tools of the Infosec Pro

Every professional has his or her toolbox, bag of tricks, and secrets of the trade. This is equally true for infosec pros. And there are multitudes of uses and purposes: automation, analysis, aggregation, detection, hacking/cracking, forensics, pen testing, s/w testing, CI/CD, and on and on. Some of these tools you’ve created yourself, some are shared freely by others, and some you’ve mashed up into new tools. Regardless, we have our favorites. Share the favorites from your infosec tool chest with your fellow ISSA members, why you need them, how they make your job easier, and why others should consider using them. This is NOT intended to be a sales or marketing pitch for your company’s tools or services, so please focus on freely available software.


September: Standards

From the earliest days of computing, standards have provided structure and details to allow a set of common concepts to emerge. The Internet, our use of cryptography, risk management, and a host of protocols and technologies we use today were codified through a string of design decisions and technical standards called Request for Comments, or RFCs. The United States government published the Rainbow Series that provided early computer security standards and guidelines. Today we look to NIST, ISO, and others to define standards. International organizations, industry associations, and corporations have added to the litany of standards that now impact the field of information security. Where did they come from? What standards are out there? How do they impact computer security? Are they good/bad? How are they evolving our field?


October: The Business Side of Security

There is no escaping the business motions associated with running a security function inside a firm. Be it managing a profit and loss plan, or in the case of an internal cybersecurity function a budget, your success depends on your ability to build and grow a solid business acumen. Your group is critical to the long-term success of the firm, but you will face business obstacles that require leadership. Build or buy? Outsource or offshore? Hire or contract? Risk accept or no? All of these decisions will affect more than just your budget; they will affect the success of your function and potentially your firm. We are seeking articles and advice on how we can all improve our interactions with the business. How do we provide foundational cybersecurity functionality in the face of a challenging business environment or build cybersecurity resilience into products?


November: Security DevOps

The field of development operation is all about getting clean code deployed quickly, but adding security to the mix is often a neglected logical step. Development operations is relatively new, and it is a technology that can have significant impact on how we do our work. Integrating security into the various automated test suites or even including security in early specification can greatly improve the code that is generated and requires the security professional to know and understand how testing is performed and even how to get into the planning or “story” part of development. Given the ability to quickly deploy code, how can security mitigate against the risks associated with its rapid deployment. There are also lessons, such as the meticulous and real-time analysis of logs to identify problems in an automated way. This is a rapidly growing field. If you have ideas or real-world experience, we would like to share it in our security DevOps issue.


December: Looking Forward

When you hear holiday music on the radio and see festive decorations everywhere you look, you know it's time to pull out the crystal ball for a glimpse at the future of information security. Will next year be the year that AI, neural nets, and machine learning can anticipate zero day attacks? What comes after GDPR, and will we ever sort out an individual’s right to control access to his or her data? What will new disruptive technologies look like, and how will they impact us? We are seeking pundits, definers, analysts, and insightful practitioners who can shed some light on the cyber threats - and solutions - that are waiting for us in 2020 and beyond


Community Search
Sign In


Calendar

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference

6/13/2019 » 6/14/2019
June CISO Executive Forum Boston, MA





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### ISSA International Conference - Home Page - Information Systems Security Association ISSA 2017 International Conference
Contact Us   |   Print Page   |   Sign In   |   Register
ISSA International Conference - Home Page

 

Join us at the 2017 ISSA International Conference!

Conference Theme | Schedule at a Glance | Registration | Venue | Hotel Reservations | Sponsors | Partners


About the Conference Theme / #ISSAConf

Join us October 9-11, 2017 at the Sheraton Hotel & Marina in San Diego, California for solution oriented, proactive and innovative sessions focused on the Digital Danger Zone

Each day, cyber threats become increasingly intricate and difficult to detect. Over the past year, we saw that with the rise of device connectivity came boundless opportunities for malicious hackers to attack device vulnerabilities. No cyber security professional can become an expert on these digital dangers without continued efforts to educate themselves on the industry’s latest trends and technologies.

We look forward to welcoming you and over 800 of your colleagues and peers in San Diego as we discuss topics ranging from incident response to application security to business skills for the information security professional. Join us at the 2017 ISSA International Conference and we’ll help you navigate the Digital Danger Zone.




Detailed Schedule
Click here for session descriptions

 

 Registration Is Open!

Registration Rates July 15, 2017 - October 8, 2017

  • Members***:  Registration is $499 USD.
  • Non-Members:  Registration is $898 USD
  • Students: Full conference registration is $150 USD

On Site Rates after October 8, 2017

  • Members***:  Registration is $549 USD.
  • Non-Members:  Registration is $998 USD
  • Students: Full conference registration is $150 USD

Volunteer Rates

Conference registration includes:

  • All sessions on October 10-11; including keynotes, breakout sessions, breakfast, and lunch both days.
  • October 9 Opening Reception and Capture the Flag.
  • October 10 Party on the Flight Deck at USS Midway.
  • A certificate of attendance for continuing professional education (CPE), up to 16 hours available.
  • Exclusive access to the ISSA International Conference mobile app for conference information and networking. The app launces in September, watch your email for details!

 ***To access the Member Rate, you must be a dues-paying member of ISSA International in good standing. On the registration website, you will prompted to search for your member record using your member email address.

Group Discounts

Staff can assist you with your group registration of 5 or more attendees. Please contact Leah Lewis for a group discount code. Group discounts are as follows:

  • 5 or more attendees: 10% off
  • 10 or more attendees: 20% off

ISSA Conference Registration Cancellation Policy:

Substitution, cancellation, and refund requests must be submitted in writing and faxed to + 703 435 4390 or emailed to conference@issa.org.

  • For cancellations received through September 15, 2017, you may receive a full refund minus a $50 administrative fee.
  • For cancellations received between September 16, 2017 through October 8, 2017, fifty percent (50%) of the registration fee will be refunded.
  • Cancellations received on or after October 9, 2017 are nonrefundable. No refunds will be granted for nonappearances.
  • Substitutions are permitted at any time upon written notice from the original registrant.
  • Confirmation of refund request is the responsibility of the attendee.
  • Refunds will be processed no later than October 31, 2017.

Venue

San Diego Sheraton Hotel & Marina
1380 Harbor Island Dr.
San Diego, CA 92101

Click here to reserve your room at the San Diego Sheraton Hotel and MarinaThe daily rate is $199 plus state and local taxes. Reservations are available until September 15, 2017 or until the block sells out, whichever comes first. Space is limited.

ONLY make your reservation using this link or by calling the hotel directly. Hotel piracy is a new epidemic in the meeting and events industry. Scam companies may reach out notifying you that ISSA has contracted outside vendors to assist you with booking your hotel reservation. These fake companies then pressure you or your office staff to provide them with your credit card information to book your hotel stay directly through them. If you fall for their trick, you may arrive to the meeting location and there will not be a reservation under your name, but your fees for the room would have been stolen from your credit card. If you are contacted in such a manner, please capture as much information as possible and send their contact information to us at mjamborsky@issa.org. Do not make any reservations with another organization, as we will be unable to assist you with any issues that may arise. Only use official ISSA materials to register for the meeting and book your hotel stay – never work with a third party, book directly through our website or email communication. We take the privacy of our members very seriously. ISSA will never release your contact information to a third party housing vendor. Also keep in mind, this situation could happen to other similar societies or organizations for any meeting, conference, or convention you might attend.


Sponsor & Exhibitor Opportunities


Contact Sean Bakke (sean.bakke@issa.org) for sponsorship options and exclusive branding opportunities.

Thank You to ISSA's 2017 Conference Sponsors

Blue Diamond Sponsor


Diamond Sponsors

                    
      


Platinum Sponsors
     






Gold Sponsors
       
     
  


Silver Sponsors

>

 
  
        
  
 
      
 
   

Exhibitors

 Image_result_for_fidelis_cyb.png  
 

 

ISSA Education Foundation Annual Fundraiser Sponsors

   
           

Media Partners



Career Center Participants

                      
           

 

       



2016 International Conference Recap

Click here to access presentations from the 2016 conference



Community Search
Sign In


Calendar

4/10/2019
ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

4/17/2019
Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference

6/13/2019 » 6/14/2019
June CISO Executive Forum Boston, MA





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy Policy │ Copyright Information
#####EOF##### ISSA International Conference - 2016 - Information Systems Security Association ISSA 2016 International Conference
Contact Us   |   Print Page   |   Sign In   |   Register
ISSA International Conference - 2016

Join us at the 2016 ISSA International Conference!

Survival Strategies in a Cyber World
November 2-3, 2016
Hyatt Regency Dallas
Dallas, TX, USA
#ISSAConf

Join us for solution oriented, proactive and innovative sessions focused on security as a vital part of business.




Detailed Program | Schedule at a GlanceRegistration | Venue | Sponsors | Partners


Schedule at a Glance
(Subject to Change)

November 1, 2016

November 2, 2016

  • 7:00 am – 4:00 pm: Conference Registration Open
  • 7:30 am – 8:15 am: ISSA SIGs Sponsored Breakfast
  • 8:15 am – 9:45 am: Welcome Remarks and Keynote Address
    To the Cloud: Ready or Not!
    Mark Weatherford
    Senior Vice President and Chief Cybersecurity Strategist, vArmour

  • 9:45 am – 4:00 pm: Exhibit Hall Open (Grand Opening at 9:45am)
  • 9:45 am - 4:00 pm: Secure Your Future: ISSA Career Central
  • 10:30 am – 11:15 am: Breakout Sessions
  • 11:15 am - 11:45 am: Coffee Break in the Exhibit Hall
  • 11:45 am – 12:30 pm: Breakout Sessions
  • 12:30 pm – 1:30 pm: Lunch in Exhibit Hall
  • 1:45 pm – 2:30 pm: Breakout Sessions
  • 2:30 pm - 2:45 pm: Coffee Break in the Exhibit Hall
  • 2:45 pm – 3:30 pm: Breakout Sessions
  • 3:30 pm - 4:00 pm: Coffee Break in the Exhibit Hall
  • 4:00 pm – 4:45 pm: Breakout Sessions
  • 4:45 pm – 5:00 pm: Prize Drawings in the Exhibit Hall
  • 5:00 pm – 6:00 pm: Cyber Defense Center: Diamond Sponsor Product Demos
  • 6:00 pm – 9:00 pm: Party in the Sky and Capture the Flag at Reunion Tower

November 3, 2016

  • 8:00 am – 3:00 pm: Conference Registration Open
  • 8:00 am – 7:00 pm: Exhibit Hall Open
  • 8:00 am - 4:00 pm: Secure Your Future: ISSA Career Central
  • 8:00 am – 9:00 am: Breakfast in Exhibit Hall
  • 9:00 am – 10:00 am: Keynote Address
    Building a Security Program that Succeeds--Scale, Efficacy and Executive Support
    Michael Coates
    CISO, Twitter

  • 10:15 am – 11:00 am: Breakout Sessions
  • 11:00 am - 11:30 am: Coffee Break in the Exhibit Hall
  • 11:30 am – 12:15 pm: Breakout Sessions
  • 12:15 pm – 2:00 pm: Awards Luncheon
  • 2:30 pm – 3:15 pm: Breakout Sessions
  • 3:15 pm - 3:30 pm: Coffee Break in the Exhibit Hall
  • 3:30 pm – 4:15 pm: Breakout Sessions
  • 4:30 pm – 5:30 pm: Cyber Defense Center: Diamond Sponsor Product Demos
  • 5:30 pm – 7:00 pm: Exhibitors' Gala Reception
  • 7:30 pm – 8:30 pm: CISO Forum Opening Dinner**

November 4, 2016

November 5, 2016

* The Chapter Leaders Summit is open to all chapter officers and board members of record at the time of registration.

** The CISO Forum and Dinner are open to members of the CISO Executive Program and qualified first time guests.


Our program is final and we are no longer accepting session proposals. To sign up for our distribution list to receive information on our 2017 Call for Speakers, click here.


Registration is Open!

Click here to register

    Registration Rates - Register between 7/1/16 - 10/31/16

    • Members***:  Registration is $399 USD.
    • Non-Members:  Registration is $798 USD
    • Student Members***: Full conference registration is $150 USD

    On Site Rates - Register 11/1/16 or later

    • Members***:  Registration is $449 USD.
    • Non-Members:  Registration is $898 USD
    • Student Members***: Full conference registration is $150 USD

    Volunteer Rates

    • Registration or Info Desk shifts:  Registration is complimentary
    • All other shifts:  Registration is $200 USD
    • Click here to sign up as a conference volunteer

     ***To access the Member Rate, you must be a dues-paying member of ISSA International in good standing. You must be logged into the ISSA website to access the discounted member rate.

    Staff can assist you with your group registration of 5 or more attendees.

    Please contact Leah Lewis for a group discount code. Group discounts are as follows:

    5 or more attendees: 10% off
    10 or more attendees: 20% off

    Venue

    Hyatt Regency Dallas
    300 Reunion Blvd.
    Dallas, TX 75207


    Click here for Sponsorship information.

    Thank You to ISSA's 2016 Conference Sponsors

    Blue Diamond Sponsor

     Armor_Logo_Orange_Tagline.png



    Diamond Sponsors

                         Carbon-Black-Tag-CMYK-full-c.png

                            VECTRA.png

     opendns-cisco-lock-up_(2).png tanium_logo_color_5000X1000.png


    Platinum Sponsors

       centrify-logo.png CP-logo-color-large.png
    MediaPro_LogowithTagline_blu.png VormetricATC_blue_V.jpg



    Gold Sponsors

     

       BOMGAR.jpg.jpg CoalfireLogo_Vertical_Orange.jpg CyberArk_logo.jpg
     cylance.png  NRI-Secure_low.jpg    Venafi_Snipped.jpg
     zscalerLogo.png

     


     


    Silver Sponsors

    ACCESS-DATA-2C-PMS-Logo_3.jpg
      anitian-logo-2016-black-on-l.gif BeyondTrust-Logo.jpg ClearswiftLogo.png
     logo_a4_cb.jpg     forum-system-vertical-center.jpg GCA_Logo-New.jpg NCCgroup-logo.png
    PT_logo_CMYK.PNG   horz_2C_logo_tag_CS.png logo-white.png   Swivel_Logo_Colour_2016-04.jpg
    Tremolo-Logo-31.png


    Exhibitors

    Above_Security_-_A_Hitachi_G.png  bluvector-logo-white.png  HORIZONTAL_on_white.png FutureComlogo.png
             
    gigamon-logo.jpg HPE_log_left_wht.png   infoArmor-logo.png    logo.png Minerva_Web_Logo.png
             
        Nyotron_logo_big_trans.png opswat-logo-rgb.png  SANS-logo.png  seclore_logo.png      SAC_Logo_Square.png
           
     SpiderOak-logo.png  Synack_E_Vertical_Lockup_RGB.png  WPA_Logo.png  

     


     

    Thank You to ISSA's 2016 Conference Partners

    CIFI-Logo.jpg    new_mena_map.jpg       EC-Council-200px.png   
             SAC_Logo_Square.png   WIRED_Security_Logo.jpg     



    2015 International Conference Recap


    Click here to access presentations from the 2015 conference

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Web Conferences - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Web Conferences


    ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Web Conference Committee.

    CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our online quizzes and surveys are powered by SurveyGizmo survey software.

    Click here for On-Demand ISSA Web Conferences

    2019 Web Conference Schedule* 

     

     ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    60-minute Live Event: Wednesday, April 10, 2019

    Click here to register

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, April 17, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA International Series: Breach Report - Review the Various Breach Reports

    120-minute Live Event: Tuesday, April 23, 2019

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     
     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, May 8, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA International Series: Breach Response - Humans in Security

    120-minute Live Event: Tuesday, May 28, 2019

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, June 12, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA International Series: Privacy - GDPR A Year Later

    120-minute Live Event: Tuesday, June 25, 2019

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, July 10, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA International Series: Security Standards Organizations - The Good, The Bad, and the Ugly

    120-minute Live Event: Tuesday, July 23, 2019

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, August 14, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA International Series: Legislative Aspects

    120-minute Live Event: Tuesday, August 27, 2019

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, September 11, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA International Series: New Trends in Security - Outsourcing and Other Tech

    120-minute Live Event: Tuesday, September 24, 2019

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, October 9, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, October 16, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA International Series: Attack of the Botnets - Internet of Terror IoT II

    120-minute Live Event: Tuesday, October 22, 2019

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, November 13, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     

     

    ISSA International Series: SDLC - Is it Useful?

    120-minute Live Event: Tuesday, November 26, 2019

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: TBD

    60-minute Live Event: Wednesday, December 11, 2019

    Start Time: 10:00 a.m. US-Pacific/ 1:00 p.m. US-Eastern/ 6:00 p.m. London

    Generously supported by: 

     


    Interested in supporting the Web Conference program?

    Please contact Sean Bakke at ISSA International Headquarters.

    Don't forget to check back periodically for updates to our Web Conference program.

    *All times and topics are subject to change.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### Community Calendar - Interest Groups: Women in Security - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Community Calendar - Interest Groups: Women in Security
    UpcomingUpcoming PastPast Month ViewMonth View Group HomeGroup Home

    Here you can find out about upcoming events. Some events may allow for online registration and the ticket purchase. Click the event name to view more details and member discounts.

    Event producers see the online co-marketing agreement for information on posting your event on the ISSA community calendar.

    Are you entering information for an ISSA Chapter Event (one directly financed by the Chapter)? Please use the Chapter Event Form to enter your event and order materials.

    Upcoming Events
    There are currently no calendar entries matching the selected criteria.
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### Information Systems Security Association

    Contact Us   |   Sign In   |   Register



      

    Developing and Connecting Cybersecurity Leaders Globally

    Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field. What can we do for you today?

    If you currently hold certifications, you can earn CPE credits by attending chapter meetings, ISSA Web Conferences, reading or contributing an article to the ISSA Journal or volunteering for activities associated with putting on educational meetings or conferences.

    Developing and Connecting Cybersecurity Leaders Globally

    Through involvement with your chapter and access to ISSA International resources, you can turn that value statement into a roadmap for your career and a vision for driving our own destiny as cybersecurity professionals. This is a growing field with a shortage of qualified professionals to fill out our security teams. Together we can use our collective knowledge and expertise to enhance our stature and influence within our companies and organizations.

    "As IT security professionals, we are often called upon to advise a wide spectrum of issues. By being fully engaged in a peer organization that shares information, our abilities are enhanced to adapt and respond appropriately.”
    Mike Godsey, Central Ohio Chapter

    Get the most out of your ISSA membership:

    Log in for access to your chapter group and other members-only resources.

    Thank You for Investing Your Time, Talent and Energies for the Betterment of ISSA and the Profession.

    Your dedication pays off in thriving chapters, engaged members, lifelong professional connections and leadership skills. Log in for resources and materials to help you with chapter management, development and growth.

    Joining the Metro Atlanta ISSA Chapter has been the best career move I have made on many fronts. As a chapter member I have expanded my network within the profession, widened my circle of influence and increased the breadth of my knowledge. As a chapter officer, I have received excellent training and experience in leadership, teaching and vendor relationships.”
    Damien Suggs, Metro Atlanta

    Whenever we can be of assistance, don’t hesitate to get in touch with our member services team, memberservices@issa.org , +1 (703) 382-8205 (local/international).

    Partnering with ISSA International is a great opportunity to reach a targeted audience of information security professionals. Our members value your support and educational contributions in advancing the information security community.

    Reasons companies that support ISSA reach a targeted audience of information security professionals

    • 81% of members come from companies with more than 1,000 employees
    • Web marketing programs reach all 10,000 active members around the world
    • 53% of members have an annual IS budget of more than $5 Million
    • 60% of members are CISSP Certified
    • 95% of members make, influence, or support purchasing decisions
    • Customized sponsorship packages designed to fit into your marketing strategy

    Please contact Sean Bakke for a copy of the Media Kit.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA



     

    Copyright © 2017, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### #####EOF##### CISO Guest Registration - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    CISO Guest Registration

    Home │ CISO Executive Membership Committee│ Guest Registration │Member Benefits │Membership Criteria

    Visit a CISO Executive Forum before you join!

    Join us at an upcoming CISO Executive Forum event. At these executive events you have the opportunity to enjoy presentations on pertinent industry topics, while connecting with other practicing professionals.

    Complete the form below and a staff member will contact you with additional information to be a guest at the next event. There is no charge for qualified first time guests to attend the program.

    CISO guest requests are subject to approval.

    The membership criteria below will act as a guideline for approval.

    CISO Membership applicants should be executive/senior-level information security professionals reporting directly to the CEO, CFO, CIO or the equivalent. In companies with more than 200 employees, CISO Executive Membership is open to qualified executive direct reports of the organization’s CISO. Individuals should be responsible for information security at the corporate or enterprise level within their organizations, be interested in discussing sensitive security issues with their peers, and be willing to share professional experiences.

    CISO Members employed by a company that sells a security product or service must meet the following additional requirements:

    1. The organization must have a clear separation between the internal security or research practitioner and those involved in sales, marketing or product management.
    2. The organization must have a minimum of 200 employees or a minimum of 2 direct reports to the CISO Member.
    3. The member must certify that he or she is not involved with the sales, marketing or product management of security products or offerings.
      Any sales activity within the CISO Forum, by non-sponsors, is expressly forbidden and grounds for cancellation of membership.

    Complete Membership Criteria »
    ISSA Code of Ethics »

    Please note: the guest program is limited to one time participation per person.

    By selecting "Yes" to the question below, I certify that I meet the qualifications for the CISO Guest Program and have read and agree to the ISSA International Code of Ethics.


    Please hover over any question with "..." to see the whole question.








    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### On Demand ISSA Web Conferences - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    On Demand ISSA Web Conferences


    The ISSA Web Conferences bring together ISSA members from across the world to share leading industry presentations and answer member’s questions. Each event is designed to address relevant topics for the timely needs of our members. The following web conferences are available for on-demand viewing.

    CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our post event quizzes and online surveys are powered by SurveyGizmo.


    ISSA On-Demand Web Conferences

     

    ISSA International Series: Threat Detection - Trends and Technology

    Recorded Live: Tuesday, March 26, 2019

    Click here to access the recording, presentation and CPE Quiz

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Generously supported by: 

     

     ISSA Thought Leadership Series: Your Hygiene is Showing-Improving Risk Posture

    Recorded Live: Wednesday, March 20, 2019

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     
     

    ISSA Thought Leadership Series: Up Up and Away: Why The Modern SOC is Rooted in the Cloud

    Recorded Live: Wednesday, March 13, 2019

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     
     

    ISSA International Series: DevOps/AppSec the State of the World

    Recorded Live: Tuesday, February 26, 2019

    Click here to access the recording, presentation and CPE Quiz

     

    ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM

    Recorded Live: Wednesday, February 20, 2019

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

    ISSA Thought Leadership Series: Adopting Zero Trust as an Enterprise Security Model

    Recorded Live: Wednesday, February 13, 2019

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

     

    ISSA International Series: 2018 Year in Review

    120-minute Live Event: Tuesday, January 22, 2019

    Click here to access the recording, presentation and CPE Quiz

     

    ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

    Recorded Live: Wednesday, January 9, 2019

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

    ISSA Thought Leadership Series: 2018 User Risk Report

    Recorded Live: Wednesday, December 12, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

     

    ISSA Thought Leadership Series: 2019 Cybersecurity Trends to Watch

    Recorded Live: Wednesday, December 5, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

                                                                                           
     

    ISSA International Series: Security Professionals Dilemma

    Recorded Live: Tuesday, November 27, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

             

     

    ISSA Thought Leadership Series: Micro-Segmentation 101

    Recorded Live: Wednesday, November 14, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

    ISSA Thought Leadership Series: The Threat Intelligence Playbook: Keys to Building Your Own Threat Intelligence

    Recorded Live: Wednesday, November 7, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

          

     

    ISSA International Series: Key & Residual Risk Indicators

    Recorded Live: Tuesday, October 23, 2018

    Click here to access the recording, presentation and CPE Quiz


     

     ISSA Thought Leadership Series: Security Event Overload-How to Net it Out

    Recorded Live: Wednesday, October 10, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

      
     

    ISSA International Series: Latest & Greatest Security Attacks & Why They Happen

    Recorded LiveTuesday, September 25, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

    ISSA Thought Leadership Series: Eliminating Security Blind Spots in your AWS Environments

    Recorded Live: Wednesday, September 19, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

    ISSA Thought Leadership Series: Cybersecurity Risk is a Shared Responsibility

    Recorded Live: Wednesday, September 12, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

    ISSA Thought Leadership Series: Email, the Original Sin 

    Recorded Live: Wednesday, September 5, 2018

    Click here to access the recording, presentation 

    Generously supported by: 

     

    ISSA International Series: Regulation & Legislation

    Recorded Live: Tuesday, August 28, 2018

    Click here to to access the recording, presentation and CPE Quiz

    ISSA Thought Leadership Series: Cybersecurity Heroes Aren't Born...They're Made

    Recorded Live: Wednesday, August 22, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by:


     ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility

    Recorded Live: Wednesday, August 8, 2018

    Click here to access the recording, presentation and CPE Quiz


    Generously supported by:

     

     

    ISSA International Series: Trials & Tribulations of Social Engineering

    Recorded LiveTuesday, July 24, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

    ISSA Thought Leadership Series: Is DNS a Part of Your Cyber Security Strategy?

    Recorded Live: Wednesday, July 11, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

     

     ISSA International Series: Cloud Services and Enterprise Integrations

    Recorded Live: Tuesday, June 26, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

     

    ISSA Thought Leadership Series: Making sense of Fileless Malware

    Recorded Live: June 13, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by:  

    ISSA International Series: Breach Report Analysis

    Recorded Live: May 22, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by:  

    ISSA Thought Leadership Series: Why Automation is Essential to Vulnerability Management

    Recorded Live: May 10, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by: 

    ISSA International Series: IoT/Mobile Security

    Recorded Live: Tuesday, April 24, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by:



     

    ISSA International Series: Blockchain & Other Mythical Technology 

    Recorded Live - Tuesday, March 27, 2018

    Click here to access the recording, presentation and CPE Quiz

             

     

    March - ISSA Thought Leadership Series: Security Awareness Strategies

    Recorded Live - Wednesday, March 21, 2018

    Click here to access the recording, presentation and CPE Quiz

    Generously supported by:

    February - ISSA International Series: Privacy vs. Security

    Recorded Live - Tuesday, February 27, 2018

    Click here to access the recording and presentation

    Generously supported by:

     

    February - ISSA Thought Leadership Series: A Cure for the Common SOC

    Recorded Live Wednesday, February 14, 2018

    Click here to access the recording and presentation

    Generously supported by:

     

    January - 2017 Year in Review & Predictions for 2018

    Recorded Live - Tuesday, January 23, 2018

    Click here to access the recording, presentation and CPE quiz.

    Generously Sponsored by: 


    November - Secondary Costs of Intrusions


    Recorded Live - Tuesday, November 28, 2017


    Click here to access the recording, presentation and CPE Quiz.

     

      

    September - Mobile Device Security


    Recorded Live: Tuesday, September 26th, 2017

    Click here for more information and to access the session recording and CPE quiz.


    Generously sponsored by



    Skycure – Now Part of Symantec and VMware



    August - Untraceable Currency


    Recorded Live - Tuesday, August 22nd, 2017


    Click here to access the recording and CPE Quiz.

     

      

     
    July - Here Come the Regulators 

    Recorded Live: Tuesday, July 25th, 2017

    Click here for more information and to access the recording and CPE Quiz.


    Generously sponsored by



    Skybox Security




    June - Building Security in a Business Culture


    Recorded Live - Tuesday, June 27th, 2017

    Click here for more information and to access the recording and CPE Quiz.


    Generously Sponsored By



    May - Breach Report Analysis


    Recorded Live - Tuesday, May 23rd, 2017

    Click here for more information and to access the recording and CPE Quiz.


    April - Evolution of Cryptography


    Recorded Live - Tuesday, April 25th, 2017

    Click here for more information and to access the recording and CPE Quiz.



    March - Internet of Things


    Recorded Live - Tuesday, March 28th, 2017

    Click here for more information and to access the recording and CPE Quiz.



    Generously sponsored by



    HP: Reinvent Security




    February - Cyber Residual Risk


    Recorded Live - Tuesday, February 28th, 2017

    Click here for more information and to access the recording and CPE Quiz.



    Generously sponsored by:


    Neustar: “The Future of Security in the Connected World”

     




    January - 2016 Security Review and Predictions for 2017


    Recorded 2 Hour Event: Tuesday, January 24th, 2017

    Click here for more information and to access the recording and CPE Quiz.


    Generously sponsored by



    HP: Reinvent Security



    When TLS Reads "Totally Lost Security"

    Recorded (2 Hour Event) on Tuesday, November 15, 2016

    Click here for more information and to access the recording.


    Generously sponsored by


    Giving the Internet an Identity



    How to Recruit and Retain Cybersecurity Professionals

    Recorded (2 Hour Event) on Tuesday, October 25, 2016

    Click here for more information and to access the recording.


    Security Architecture & Network Situational Awareness

    Recorded (2 Hour Event) on Tuesday, September 27, 2016

    Click here for more information and to access the recording.


    Generously sponsored by


    RedSeal. The measure of resilience.



    IoT: The Information Ecosystem of the Future--And Its Issues

    Recorded (2 Hour Event) on Tuesday, August 23, 2016

    Click here for more information and to access the recording.


    Generously sponsored by


    Giving the Internet an Identity



    Hacking the Social Grid: Gullible People at 670 Million Miles per Hour

    Recorded (2-hour event): Tuesday, July 26, 2016

    Click here for more information and to access the recording.


    Legislative Impact: When Privacy Hides the Guilty Party

    Recorded (2-hour event): Tuesday, June 28, 2016

    Click here for more information and to access the recording.


    Breach Report Analysis--SWOT or SWAT?

    Recorded (2-hour event): Tuesday, May 24, 2016

    Click here for more information and to access the recording.

    Generously sponsored by


    The Sky Is Falling... CVE-2016-9999(nth)?


    Recorded (2-hour event): Tuesday, April 26, 2016

    Click here for more information and to access the recording.

     
     

    Security Software Supply Chain: Is What You See What You Get?


    Recorded (2-hour event):Tuesday, March 22, 2016


    Click here for more information and to access the recording.


     

    Mobile App Security (Angry Birds Hacked My Phone)

    Recorded (2-Hour Event): Tuesday, February 23, 2016

    Click here for more information and to access the recording.

     Generously sponsored by:

     

    2015 Security Review & Predictions for 2016

    Recorded (2-hour event): Tuesday, January 26, 2016

    Click here for more information and to access the recording. 


    Forensics -- Tracking the Hacker


    Recorded (2-hour event): Tuesday, November 17, 2015

    Click here for more information and to listen to the recording.


    Big Data--Trust and Reputation, Privacy--Cyber Threat Intelligence

    Recorded (2-hour event): Tuesday, October 27, 2015

    Click here
    for more information and to access the recording.

        
    Security of IOT-- One and One Makes Zero

    Recorded Live (2-hour event): Tuesday, September 22, 2015

    Click here for more information and to listen to the recording.

    Generously Sponsored By:

    CSSLOGO.jpg


     Biometrics & Identity Technology Status Review

    Recorded Live (2-hour event): Tuesday, August 25, 2015

    Click here for more information and to access the recording.

     

    Network Security Testing – Are There Really Different Types of Testing? 

    Recorded Live (2-hour event): Tuesday, July 28, 2015

    Click here for more information and to access the recording.

    Generously Sponsored By:

     

    Global Cybersecurity Outlook:
    Legislative, Regulatory and Policy Landscapes

    Recorded Live (2-hour event): Tuesday, June 23, 2015

    Click here for more information and to access the recording.

     

     Breach Report: How Do You Utilize It?

    Recorded Live: Tuesday, May 26, 2015

     Click here for more information and to access the recording.

     

     Open Software and Trust--Better Than Free?

    Recorded Live: Tuesday, April 28, 2015

     Click here for more information and to access the recording.

    Generously Sponsored By:

     

     

     

    Continuous Forensic Analytics – Issues and Answers

    Recorded Live: April 14, 2015

    Click here for more information and to access the recording.

    Generously Sponsored by:

     

     

    Secure Development Life Cycle for Your Infrastructure

    Recorded Live: March 18, 2015

     Click here for more information and access the recording.

    Generously supported by:

     

     

    What? You didn't know Computers Control you? / ICS and SCADA

    Recorded Live: March 2, 2015

     Click here for more information and to access the recording.

    Generously supported by:


    Interested in supporting the Web Conference program?

    Please contact our Sponsorship team at sponsor@issa.org.



    Security Software Supply Chain: Is What You See What You Get?


    2-Hour Live Event: Tuesday, March 22, 2016
    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Click here to register and for more information.

    Security Software Supply Chain: Is What You See What You Get?


    2-Hour Live Event: Tuesday, March 22, 2016
    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Click here to register and for more information.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### CISO Executive Membership Committee - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    CISO Executive Membership Committee

    Home â”‚ CISO Executive Membership Committee│ Guest Registration â”‚Member Benefits â”‚Membership Criteria 

    Chairperson



    Dr. Shawn P. Murray

    ISSA International Board of Directors


      Co-Chair


    Wayne P. Proctor, CISSP, CISA, CISM, CRISC

    VP of Information Security, WestRock


     


     




    Robb Reck, CISSP

    VP, Chief Information Security Officer, Pulte Financial Services

     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Special Interest Group On-Demand Webinars - Information Systems Security Association ISSA SIG Webinars On Demand
    Contact Us   |   Print Page   |   Sign In   |   Register
    Special Interest Group On-Demand Webinars

     

    Special Interest Groups (SIG) On-Demand Webinars


    ISSA SIG Web Conferences bring together ISSA SIG members from around the world to share leading industry presentations and answer members' questions. Each SIG event is designed to address the timely needs of our SIG members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Special Interest Groups.

    CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post event quiz, to submit CPE credits for various certifications. Our online quizzes and surveys are powered by SurveyGizmo survey software.


    ISSA SIG On-Demand Web Conferences

     

    ISSA Women in Security SIG

    Leading The State Of Colorado To Cybersecurity Success

    Recorded Live: October 16th, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Financial SIG

    Preparing for Your Next Inspection

    Recorded Live: September 15th, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Healthcare SIG

    Collaboration to Achieve Medical Device Security

    Recorded Live: September 14, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    Enabler for Women and Under-served Communities in STEM Education and Careers

    Recorded Live: September 11th, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    Privacy as a Component of the Cybersecurity World - Or is it?

    Recorded Live: August 14th, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Security Education and Awareness SIG

    Lessons Learned in Security Awareness

    Recorded Live: August 9th, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post conference survey for CPE certificate.

     

    ISSA Women in Security SIG

    A look at the increasingly complex critical infrastructure protection landscape

    Recorded Live: July 10th, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Financial SIG

    Blockchains and Crypto Currency

    Recorded Live: June 16, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Healthcare SIG

    Risk Assessment Models for Healthcare Organizations

    Recorded Live: June 15, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    Five Skills Every Woman Can Master

    Recorded Live: June 12, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Security Education and Awareness SIG

    Change is Simply an Act of Survival

    Recorded Live: May 10, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    Maximize Your IT Career with Mentoring and Sponsorship

    Recorded Live: May 8, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    Closing the Cybersecurity Gender Gap

    Recorded Live: April 10, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Healthcare SIG

    Healthcare and the Cloud: Pros and Cons of Security and Privacy

    Recorded Live: March 16, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    STEM for Her: Funding Girls Education Initiatives for Future Success

    Recorded Live: March 13, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Security Education and Awareness SIG

    Social Engineering Tests

    Recorded Live: February 15, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post conference survey for CPE certificate.

     

    ISSA Women in Security SIG

    Million Women Mentors

    Recorded Live: February 13, 2017

    Click here to view the recording
    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    Cyber Risk Leadership

    Recorded Live: January 9, 2017

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Healthcare SIG

    Auditing and Access to Health Records

    Recorded Live: December 15, 2016

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    2017-2020 A Look Ahead

    Recorded Live: December 12, 2016

    Click here to view the recording

    Click here to download a copy of the presentation slides
    Click here to access the post conference survey for CPE certificate.

     

     

    ISSA Financial SIG

    Financial Security Incidents: Forecast for 2017

    Recorded Live: December 9, 2016

    Click here to view the recording

    Click here to download a copy of the presentation slides
    Click here to access the post conference survey for CPE certificate.

     

     

    ISSA Women in Security SIG

    Promoting Creativity

    Recorded Live: November 14, 2016

    Click here to view the recording

    Click here to download a copy of the presentation slides
    Click here to access the post conference survey for CPE certificate.

     

     

    ISSA Women in Security SIG

    Taking Your First Steps Towards an INFOSEC Career

    Recorded Live: October 17, 2016

    Click here to view the recording

    Click here to download a copy of the presentation slides
    Click here to access the post conference survey for CPE certificate.

     

     

    ISSA Security Education and Awareness SIG

    Cyber Security Celebration 2016; What are you doing?

    Recorded Live: September 14, 2016

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post conference survey for CPE certificate.

     

    ISSA Women in Security SIG

    Virtual Mentoring

    Recorded Live: September 12, 2016

    Click here to view the recording
    Click here to access the post conference survey for CPE certificate.

     

    ISSA Women in Security SIG

    One Woman's Answer to the Cybersecurity Talent Shortage

    Recorded Live: August 15, 2016

    Click here to view the recording
    Click here to view a copy of the presentation slides

    Click here to access the post conference survey for CPE certificate.

     

    ISSA Women in Security SIG

    Everybody Wins: Fostering Positive Workplace Environments

    Recorded Live: July 11, 2016

    Click here to listen to the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Healthcare SIG

    3rd Party Risk Assessment for Healthcare Organizations

    Recorded Live: June 23, 2016

    Click here to listen to the recording
    Click here to view a copy of the presentation slides

    Click here to access the post-event quiz to get a CPE certificate


    This Healthcare SIG Webinar is generously sponsored by


     

     

    ISSA Security Education and Awareness SIG

    10 Things Disney Can Teach Us About Running a Security Awareness Program

    Recorded Live: June 15, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

     

     

    ISSA Women in Security SIG

    Mentorship Session: Welcome to the Women's Corner

    Recorded Live: June 13, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Women in Security SIG

    Overcoming the Real Barriers to Women in Security

    Recorded Live: May 9, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

     

    ISSA Financial SIG

    Vendor Security Risk Management

    Recorded Live: April 29, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

     

     

    ISSA Women in Security SIG

    Engineering Women & The Power of Publishing

    Recorded Live: April 11, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

     

     

    ISSA Healthcare SIG

    Existing Tools and Frameworks for Securing the Healthcare Industry

    Recorded Live: March 31, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate
    Click here to download a copy of the slides

     

     

    ISSA Security Education and Awareness SIG

    Security Awareness 2.0 The Human Element

    Recorded Live: March 16, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

      

    ISSA Women in Security SIG

    Tackling the Talent Shortage

    Recorded Live: March 14, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

     

     

    ISSA Women in Security SIG

    Designing an Educational Game to Obtain Teenage Girls’ interest in Cyber Security

    Recorded Live: February 8, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

     

     

    ISSA Financial SIG

    Why are Transnational Criminal Enterprises Targeting the Financial Services Sector and is My Organization Prepared or are We the Next Victim?

    Recorded Live: February 5, 2016

    Click here to listen to the recording

     

     

    ISSA Security Education and Awareness SIG

    Cyber Security to detect attacks using Behavior analytics and Machine learning

    Recorded Live: January 27, 2016

    Click here to listen to the recording


     

    ISSA Women in Security SIG

    Why Social and Emotional Intelligence (SEI) Skills Are Needed by Information Systems Security Professionals in Order to Be Successful.

    Recorded Live: January 11, 2016

    Click here to listen to the recording
    Click here to access the post-event quiz to get a CPE certificate

     

     

    ISSA Financial SIG

    Financial Security Incidents: Forecast for 2016

    Recorded Live: November 20, 2015

    Click here to listen to the recording
    Presentation Resource: Email Account Compromise PSA
    Presentation Resource: Business Email Compromise PSA

     

     

    ISSA Security Education and Awareness SIG

    They Didn't Do What You Trained Them To Do? What Went Wrong?

    Recorded Live: November 18, 2015

    Click here to listen to the recording
    Click here to download the slides
    Click here to access the post-event quiz to get a CPE certificate

      

    ISSA Women in Security SIG

    Leveraging Cyber Competitions to Build Skills and Recruit Cyber Employees

    Recorded Live: November 9, 2015

    Click here to listen to the recording

     

     

    ISSA Security Education and Awareness SIG

    The First Rule of Security Awareness is...

    Recorded Live: September 16, 2015

    Click here to listen to the recording

     

    ISSA Women in Security SIG

    Leadership Challange: Recruitment and Retention in an Information Security World

    Recorded Live: September 14, 2015

    Click here to listen to the recording

      

    ISSA Financial SIG

    Roundtable Discussion: Identifying Metrics and Reporting for Management

    Recorded Live: August 21, 2015

    Click here to listen to the recording

     

     

    ISSA Women in Security SIG

    Paying It Forward - Preparing Women for Cybersecurity Careers

    in the Knowledge Age and Beyond

    Recorded Live: July 13, 2015

    Click here to listen to the recording

     

     

    ISSA Security Education and Awareness SIG

    Security Education & Awareness Future... To Infinity and Beyond!

    Recorded Live: June 17, 2015

    Click here to listen to the recording

     

     

    ISSA Financial SIG

    Understanding the Cybersecurity Risk in Financial Institutions

    Recorded Live: June 12, 2015

    Click here to listen to the recording

     

     

    ISSA Women in Security SIG

    Networking for Professional Growth:

    Reaching Outside of Your Comfort Zone

    Recorded Live: June 8, 2015

    Click here to listen to the recording

     

    ISSA Women in Security SIG

    The Art of the Ask:
    How to Ask for ­ and Get ­ What You Want in Your Career

    Recorded Live: April 6, 2015

    Click here to listen to the recording

     

     

    ISSA Security Education and Awareness SIG Webinar

    Building organizational resilience amidst global uncertainty

    Recorded Live:March 18, 2015

    Click hereto listen to the recording

     


    ISSA Women in Security SIG

    The Art of the Ask:
    How to Ask for ­ and Get ­ What You Want in Your Career

    Recorded Live: February 9, 2015

    Click here to listen to the recording

     


    ISSA Women in Security SIG

    Women's Voices Series: Interview with Diane Barrett

    Recorded Live:November 17, 2014

    Click hereto listen to the recording.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Community Calendar - Interest Groups: Financial - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Community Calendar - Interest Groups: Financial
    UpcomingUpcoming PastPast Month ViewMonth View Group HomeGroup Home

    Here you can find out about upcoming events. Some events may allow for online registration and the ticket purchase. Click the event name to view more details and member discounts.

    Event producers see the online co-marketing agreement for information on posting your event on the ISSA community calendar.

    Are you entering information for an ISSA Chapter Event (one directly financed by the Chapter)? Please use the Chapter Event Form to enter your event and order materials.

    Upcoming Events
    There are currently no calendar entries matching the selected criteria.
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### CISO Executive Membership Criteria - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    CISO Executive Membership Criteria

    Home â”‚ CISO Executive Membership Committee â”‚ Guest Registration â”‚Member Benefits â”‚Membership Criteria 

    CISO Forum Membership Criteria: The CISO Executive Forum is a peer-to-peer event. The unique strength of this event is that members can feel free to share concerns, successes, and feedback in a peer only environment.

    Membership is subject to approval. Membership criteria below will act as a guideline for approval.

    Membership Criteria

    1. CISO membership applicants should be executive/senior-level information security professionals reporting directly to the CEO, CFO, CIO, or the equivalent. In companies with more than 200 employees, CISO Executive membership is open to qualified, executive direct reports of the organization’s CISO. Individuals should be responsible for information security at the corporate or enterprise level within their organizations, be interested in discussing sensitive security issues with their peers, and be willing to share professional experiences.

      CISO Members employed by a company that sells security services or products must meet the following additional requirements;

      1. The organization must have a clear separation between the internal security or research practitioner and those involved in sales, marketing or product management.

      2. The organization must have a minimum of 200 employees or a minimum of 2 direct reports to the CISO member.

      3. The member must certify that he or she is not involved with the sales, marketing or product management of security products or offerings.

    2. Each new member will be asked to complete an application stating their company size, number of direct reports, and industry sector, to determine the significance of their security portfolio. In addition, members will agree that they have read and qualify for CISO Membership. Any false statement on the application will be subject to review by the ISSA Ethics Committee and could result in cancellation of membership.

    3. Any sales activity within the CISO Forum, by non-sponsors, is expressly forbidden and grounds for cancellation of membership.

    4. Emeritus membership will be available and approved on an individual basis by the Advisory Council.

    5. If a CISO member should be unable to attend a Forum after submitting a RSVP, substitution of staff will be permitted. This substitute will be subject to the above criteria, but may be the direct report of the qualified member.

    6. Members may invite peers and direct reports within their organization as guests to the CISO Executive Forums. Guest will be asked to submit the same completed non-disclosure agreement and certify that they are not involved in the sales and marketing of security offerings. CISO members’ guests will be invited on space available basis, and subject to approval.

      An example of a CISO Guest might be, a divisional security executive (direct report), CIO, CFO or other internal constituent who the CISO Member may wish to involve in the Forum. At this time there will be no charge for a CISO Guest to participate in the Forum, though ISSA will not provide rooming for these guests. A maximum of two guests will be allowed per event, per member.

    The ISSA reserves the right to accept or reject any applicants based on their qualifications (see above) and the current capacity of the CISO Executive membership. The ISSA may revoke the membership status of any participant if required, to maintain the integrity of the program. The ISSA does not discriminate on the basis of race, color, creed, national origin, ancestry, sex, marital status, disability, religious or political affiliation, age, or sexual orientation.

    Code of Ethics

    As an ISSA member, guest and/or applicant for membership, I have in the past and will in the future:

    • Perform all professional activities and duties in accordance with all applicable laws and the highest ethical principles;
    • Promote generally accepted information security current best practices and standards;
    • Maintain appropriate confidentiality of proprietary or otherwise sensitive information encountered in the course of professional activities;
    • Discharge professional responsibilities with diligence and honesty;
    • Refrain from any activities which might constitute a conflict of interest or otherwise damage the reputation of or is detrimental to employers, the information security profession, or the Association; and
    • Not intentionally injure or impugn the professional reputation or practice of colleagues, clients, or employers.

    Membership Cost

    $995 plus chapter dues, per 12-month period.

    For more information

    Please contact Sean Bakke at ISSA International Member Services
    781-569-6607.

    Member Benefits

    Renew or join online to save postage and avoid delays in processing your application.

    Or download a print-ready membership application.

     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### #####EOF##### Event Co-Marketing Agreement - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Event Co-Marketing Agreement

    Thank you for your interest in making ISSA members aware of your event. We will consider co-marketing agreements for events that offer our members discounts that match or exceed best discounts made available to other participants and agree to market ISSA. Events that are in the same geographical location, timeframe and/or provide a similar agenda to ISSA sponsored events may not be approved for co-marketing. Due to the volume of requests we receive, ISSA cannot customize this agreement. If you have questions, please call ISSA Headquarters at +1 (703) 382-8205 (local/international)/vendor@issa.org.

    Once accepted ISSA will:

    • List your event on the ISSA International website events calendar (allow 10 business days for event to be posted)
    • Include event announcements in bi-weekly eNewsletter and monthly ISSA Journal (member magazine), based on space availability and level of discount

    Please complete all the below information and submit at least four weeks in advance of the event. Approved co-marketing agreements will be posted within ten business days.

    Are you entering information for an ISSA Chapter Event (one directly financed by the Chapter)? Please use the Chapter Event Form.

      
    Current Page
      
    Unvisited
      
    Valid
      
    Missing or invalid required information
    1
    2
    3
    4
    | Save and Continue Later

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Member Login
    Welcome to the online community. Because of the built-in security features, you must first register and be approved before accessing many site sections. If you are not a member of the site yet, please register - we'd love you to be part of our online community. 

    Forgot your password?
    Click here to reset your password.

    Haven't registered yet?
    Click here to Register
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Renew Online - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Renew Online

    Online Renewal for Existing or Expired ISSA Members

    Note: past membership accounts are never deleted. Please contact us if you need help logging in. Not yet a member of the ISSA? Join online

    Renew by logging in

    Log in, click on the "membership info" tab on the right side of the page and follow the links to securely renew your membership. If you have an expired account or need assistance in accessing the renewal page, please contact customercare@issa.org

    • You can update your membership information (address, job title, employer, privacy settings, etc.) either before or after renewal. To edit, click on "manage profile” located on the right side under "my ISSA profile”. Click on "edit bio” to make and save your changes. To return to the renewal page, click on "membership info” and then click on the "securely renew your membership”
    • When renewing you will select a type of membership. Click here for details on available membership types and criteria
    • To select your chapter(s), click the plus sign next to chapter dues to select the chapter(s) you would like to join/rejoin. A list of chapters can be found on the chapter directory page.
    • Enter billing and credit card Information. Make sure to complete the required fields indicated by the red asterisks
    • Accept the terms of use, including the ethic policy
    • You are renewed!! Continue to enjoy your ISSA membership, click on the chapter directory to find a link your local chapter’s page with meeting and events. www.issa.org will give your access to events, publication and education through the international organization

    Considering changing your membership type?

    Read more about membership types.

    Questions or Problems?

    For assistance, please contact customercare@issa.org

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### #####EOF##### #####EOF##### CISO Executive Forum - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    CISO Executive Forum

    Home │ CISO Executive Membership Committee│ Guest Registration │Member Benefits │Membership Criteria


    The role of information security executive continues to be defined and redefined as the integration of business and technology as it evolves. While these new positions gain more authority and responsibility, peers must form a collaborative environment to foster knowledge and influence that will shape the profession.

    The Information Systems Security Association (ISSA) recognizes this need and created the exclusive CISO Executive Membership program to give executives an environment to achieve mutual success. Connecting professionals to a large network of peers, valuable information, and top industry experts the program is a functional resource for members to advance personal and industry understanding of critical issues in information security.

    The CISO Executive Forum is a peer-to-peer event. The unique strength of this event is that members can feel free to share concerns, successes, and feedback in a peer only environment.


    2019 Events Calendar*

    No Rest for the Weary: The Continued Convergence of Privacy and Security
    Boston, MA
    June 13-14, 2019
    Event Details
    Member Registration
    Guest Registration

    Emerging Technologies
    Las Vegas, NV
    August 4-5, 2019
    Event Details
    Member Registration
    Guest Registration

    Security Metrics
    Dallas, TX
    September 30-October 1, 2019
    Events Details
    Member Registration
    Guest Registration


    *dates and locations subject to change


    Questions?

    Please contact Sean Bakke at ISSA International Headquarters.
    +1 781 569 6607

    Interested in Sponsoring a CISO Executive Forum?

    Please contact the ISSA Sponsorship Team at ISSA International Headquarters.

    2019 ISSA Media Kit


    Archived CISO Forum Events

    San Francisco, CA
    March 2-3, 2019
    Theme: Innovation & Technology, Escape from RSA!
    Event Details

    Atlanta, GA
    October 18-19, 2018
    Theme: Security, Legal and Privacy Collaboration
    Event Details

    Denver, CO
    August 16-17, 2018
    Theme: DevOps Security

    Event Details

    San Francisco, CA
    April 14-15, 2018
    Theme: Emerging Technology
    Event Details

    Scottsdale, AZ
    January 25-26, 2018
    Theme: Cyber Resilience and Response: Keeping the lights on in the face of cyber attacks
    Event Details

    San Diego, CA
    October 11-12, 2017 
    Theme: Payment Strategies: The Game Has Changed
    Event Details

    Las Vegas, NV
    July 23-24, 2017
    Theme: Security Awareness and Training--Enlisting your entire workforce into your security team
    Event Details

    Washington DC
    April 20-21, 2017
    Theme: Information Security, Privacy and Legal Collaboration 
    Event Details

    San Francisco, CA
    February 11-12, 2017
    Theme: Innovation and Technology
    Event Details

    Dallas, TX
    November 3-4, 2016
    Theme: Big!
    Event Details

    Las Vegas, NV
    July 31-August 1, 2016
    Theme:Convergence: Securing the World Around You
    Event Details

    Charlotte, NC
    May 19-20, 2016
    Theme: Infosec and Legal Collaboration
    Event Details

    San Francisco, CA
    February 27-28, 2016
    Theme: Innovation and Technology
    Event Details

    Chicago, IL
    October 10-11, 2015
    Theme: Cloud Security Management
    Event Details

     Las Vegas, NV
    August 2-3, 2015
    Theme: Third Party Oversight: Bring Your Third Party Risk Manager
    Event Details 

    San Francisco, CA
    April 18-19, 2015
    Theme: New Strategy and Technology Approaches for the CISO. Bring your CIO!
    Event Details

    Atlanta, GA
    January 29-30, 2015
    Theme: InfoSec and Legal Collaboration
    Event Details

    Orlando, FL
    October 23-24, 2014
    Theme: GRC
    Event Details

    Las Vegas, NV
    Date: August 4, 2014
    Theme: Application Security - Threats, Challenges and Approaches
    Event Details

    New Orleans, LA
    May 1-2, 2014
    Theme: Surviving the Legal Battlefield
    Event Details

    San Francisco, CA

    February 22-23, 2014
    Theme: Presenting the Business Case for Information Security
    Held preceding RSA Conference 2014 – USA
    Event Details

    Nashville, TN
    October 10-11, 2013
    Held in conjunction with the ISSA International Conference
    Theme: Dust Off Your Bottles...You Might Like What’s Inside
    Event Details

    Pittsburgh, PA
    August 8-9, 2013
    Theme: The Human Effect
    Event Details

    Dallas, TX
    May 9-10, 2013
    Theme: Incident Response - Threats and Malware Everywhere…Now’s the Time to ACT!
    Event Details

    San Francisco, CA
    February 23-24, 2013
    Theme: CISO Survival in the Real World
    Event Details

    Anaheim, CA
    October 26-27, 2012
    Held in conjunction with the ISSA International Conference
    Theme: From Change-Driven Challenges to Change-Driven Ingenuity
    Event Details

    Boston, MA
    August 2-3, 2012
    Theme: Communication in the C-Suite

    Event Details


    "The opportunity to interact and network with others at this level, discussing challenges we all face honestly, candidly is invaluable.”
    - Walter Williams
    Director of Security and Compliance
    Lattice Engines


    "I do not attend many of the information security conferences because I could teach most of the sessions they present. I continue to attend the ISSA CISO Executive Forums every year because the content is strategic, new, and valuable, the speakers are of the highest quality, and I’m with peers who share the unique challenges we face as senior level information security officers."
    - Ann Seltzer
    IT Global Security Services
    Brady Corporation


    "The topics at the ISSA CISO Executive Forum are relevant to today’s challenging Information Security issues that span all industries. Relationships that I have formed through this venue with both participants and vendors are long lasting and have proven to be invaluable resources in facing common challenges.”

    - Kevin Rigney
    Chief Information Security Officer
    PETCO Animal Supplies, Inc.


     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Community Calendar - Interest Groups: Healthcare - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Community Calendar - Interest Groups: Healthcare
    UpcomingUpcoming PastPast Month ViewMonth View Group HomeGroup Home

    Here you can find out about upcoming events. Some events may allow for online registration and the ticket purchase. Click the event name to view more details and member discounts.

    Event producers see the online co-marketing agreement for information on posting your event on the ISSA community calendar.

    Are you entering information for an ISSA Chapter Event (one directly financed by the Chapter)? Please use the Chapter Event Form to enter your event and order materials.

    Upcoming Events
    There are currently no calendar entries matching the selected criteria.
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Benefits of Membership - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Benefits of Membership

    Home â”‚ CISO Executive Membership Committee â”‚ Guest Registration â”‚Member Benefits â”‚Membership Criteria 

    ISSA CISO Executive Membership Program

    The role of information security executive continues to be defined and redefined as the integration of business and technology as it evolves. While these new positions gain more authority and responsibility, peers must form a collaborative environment to foster knowledge and influence that will shape the profession.

    The Information Systems Security Association (ISSA) recognizes this need and created the exclusive CISO Executive Membership program to give executives an environment to achieve mutual success. Connecting professionals to a large network of peers, valuable information, and top industry experts the program is a functional resource for members to advance personal and industry understanding of critical issues in information security.

    Membership Benefits

    • Free registration at 4 CISO Executive Forums per year, including lodging for one night* and all meals at each Forum
    • Extensive networking opportunities with peers and experts on an on-going basis
    • Privileged access to onlinecommunity
    • Direct access to top subject matter experts through educational seminars
    • An effective forum for understanding and influencing relevant standards and legislation
    • A unified voice to influence industry vendors
    • Automatic CPE submission
    • The option of an additional ISSA International general membership for assignment to an individual on the CISO member’s staff** ($95+ value)
    • Basic Wisegate membership, including exclusive access to the Wisegate community and ISSA CISO Forum private group ($2,450 value)

    *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

    **To register your staff person for ISSA membership, contact Sean Bakke with the person's name, title, and email address to process their membership

    Membership Cost

    $995 per 12-month period, plus ISSA Chapter dues.

    Membership Application

    Join online

    For more information or to upgrade your existing ISSA membership, please contact Sean Bakke 781 569 6607

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### #####EOF##### September 2017 ISSA Web Conference - Information Systems Security Association September 2017 ISSA International Web Conference
    Contact Us   |   Print Page   |   Sign In   |   Register
    September 2017 ISSA Web Conference




    Mobile Device Security

    Recorded Live: Tuesday, September 26th, 2017

    Click here to access the recording.
    Click here for a copy of the slides.
    Click here to take the post conference quiz for CPE credits.


     


    Generously sponsored by



    Skycure – Now Part of Symantec and VMware



    Overview:

    Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also still personal devices, where the user is the administrator and corporate IT is the guest. Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that is essential in this new world of the modern mobile operating systems?


    Moderator:

    Matt Mosely

    Speakers:

    Brian Duckering - Mobile Security Specialist at Symantec
    Brian has been a thought leader and respected advisor in enterprise IT for over 15 years. With experience in engineering, product management, marketing, business strategy and technology evangelism, he has held executive-level positions at business- and consumer-facing companies, both large and small, and has multiple degrees in engineering and technology management. Brian has spent the last seven years focused on enterprise mobility, with a focus on achieving both productivity and security.

    Sachin Sharma - Senior Product Line Marketing Manager at VMware
    Sachin Sharma is a Sr. Product Line Marketing Manager at VMware, where he is leading go-to-market efforts for security across End-User Computing technologies. Prior to VMware, he was a Sr. Systems Engineer at Wanova, which was acquired by VMware. Prior to that, he has been in several systems engineering, pre-sales engineering, and consulting roles, including with Nimsoft, which was acquired by CA Technologies. He has over 15 years of experience in various IT and systems management roles and holds a Bachelor of Science in Computer Science and Engineering, and an Economics degree from the University of California at Davis. Follow him on twitter @sachin_d_sharma.

    -

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### March 2015 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    March 2015

     

    Secure Development Life Cycle for Your Infrastructure

    2-Hour Live Event: Tuesday, March 24, 2015
    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Click here to listen/view the Web Conference recording
    Click here to download the slidedeck.
    Click here to take the CPE quiz to download your Certificate of Attendance

    Web Conference Overview:

    We have heard a lot about the Security Development Life-Cycles throughout the years, but how do you do this and how can you extend this throughout the enterprise? What are the changes that we need to consider?  This presentation will discuss the lifecycle view of the network and how you can take advantage of a lifecycle approach through design, validation and process management to secure your network.

    Join the conversation: #ISSAWebConf


    Moderator and Speakers:


    Moderator:

    Jorge Orchilles
    Vice President, South Florida ISSA
    Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Masters of Science in Management Information Systems from Florida International University, leads the Advanced Penetration Testing & Vulnerability Assessment Quality Control teams in a large financial institution and serves as Vice President of the Information Systems Security Association South Florida Chapter.


    Speakers:

    Fred Kost 
    VP, Enterprise Marketing: Ixia
    Fred is the vice president of security solutions at Ixia. He is responsible for managing and marketing the Ixia security and applications portfolio. Kost has a passion for security and has been involved in information security for most of his career. Prior to Ixia, Fred was head of product marketing for Check Point Software. Fred has over15 years of experience in the information security field and speaks frequently on information security. He has also held leadership positions and has extensive experience in security with companies such as Cisco, Symantec, nCircle, Blue Lane Technologies and Recourse Technologies. Fred holds a Bachelor of Science in Electrical Engineering from Purdue University and an MBA from the Kenan-Flagler Business School at the University of North Carolina. 

    Hari Pendyala
    Chief Advisor, Director: Zraddhaa Information Services
    Hari M. Pendyala has 19+ years of experience in Information Technology. Hari is Currently the COO of 7inQ – A Startup Accelerator based out of India. He is Director & Chief Advisor for ZIS Pvt. Ltd. – An Information Security Services Company servicing Asia-Pac region. Hari is a CISSP, CISM and ITIL v3 certified professional and is an ISSA Fellow, currently serving as President, ISSA India, Bangalore and President, TITA (Tirupati Information Technology Association) Hari has served as board member Silicon Valley ISSA in various roles from 2004 till 2009. He thoroughly enjoys mentoring K-8 kids about Robotics and other science topics. He has Master’s in Computer Engineering from Florida Atlantic University, Florida and Bachelor's in Electrical and Electronics Engineering from S.V.University, Tirupati, India.


    Michael F. Angelo
    Chief Security Architect: NetIQ Corporation
    Michael is well known in the security community with his work designing, developing, implementing and deploying security products and architectures for multi-national corporate environments. His work includes participating, driving, and creating security standards, working on corporate policies, national and international legislation, and multi-national regulatory issues. Michael is very active in the security community at large and participates in numerous international and national advisory councils. Currently, he chairs the ISSA International Webinar Committee, and is a technology contributor to the U.S. Department of Commerce Information Systems Technical Advisory Council. He has also been a featured speaker at numerous national and international security conferences, including RSA, ISSA, and InfoSec. In 2012 and 2013 he was on the RSA national symposia committee. Michael currently holds 52 U.S. patents (77 World Wide), with the majority being in the area of security and authentication; he is a former Sigma-Xi distinguished lecturer, recipient of the Trusted Computing Platform Alliance (TCPA) lifetime achievement award. In 2011 he was recognized by ISSA as the Security Professional of the Year and in 2013 received the ISSA Hall of Fame Award.


    Sponsored by:

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### September 2015 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    September 2015



    Security of IOT -- One and One Makes Zero

     Click here to view the live recording of the September 22, 2015 Conference.
    Click here to view the slide deck.
    Click here for the CPE Quiz.

    Generously Sponsored By:

     
    CSSLOGO.jpg


    Overview:

    Given our experiences with Supervisory Control And Data Acquisition (SCADA) systems and medical devices over the past few years, is the Internet of Things a true catastrophic event in the making? Potential areas for this webinar include – device level security, things that maybe implemented in the automobile world, examples of where devices have been hacked already, and potential mitigations for them.


    Moderator:

    Phillip Griffin
    ISSA Educational Advisory Council Member
    Phillip is a CISM and ISSA Fellow with over 20 years of information assurance experience. Phil has served as a trusted security adviser, security architect, and consultant with leading corporations. He has acted as committee chair, editor, and head of delegation in the development of US national and international security standards, and he currently serves on the ISSA Educational Advisory Council. His current work encompasses encryption technologies, access control, and biometric information security management policy. Phil has nine U.S. patents at the intersection of biometrics, RFID, and information security, a number of academic and professional technical publications, and he has spoken at leading security conferences around the world.


    Speakers:

    James McQuiggan
    CISSP, Program Manager, NERC CIP Compliance at Siemens Energy

    James McQuiggan is the President of the Central Florida ISSA Chapter and has been a part of ISSA for the past five years. He is also a member of the Information Security team as the NERC CIP Program Manager for Siemens Energy Inc.supporting internal and external customers with the CIP standards. He is also responsible for Product Security and the Information Security Advisor Program. His focus of Product Security is the Energy products, involving SCADA and DCS systems and providing consulting services on securing their network and physical plant environments.

    Larry John
    Principal Analyst, Analytic Services, Inc.

    Larry John holds a bachelor’s in political science at Penn State and a master’s in public administration from Northern Michigan University. He is a PhD candidate in systems engineering at Stevens Institute of Technology. A retired US Air Force officer, Mr. John is employed as a Principal Analyst with Analytic Services Inc., a not-for-profit public service institute in Falls Church, VA. He was previously Principal Consultant and Director, Government Services at Ptech, Inc. He has presented papers at four international systems engineering conferences and published articles in several systems engineering journals. Mr. John is active in IEEE, the American Society for Quality (ASQ), the International Council on Systems Engineering (INCOSE), the American Society for Public Administration (ASPA), and the Military Operations Research Society (MORS).

    Tom Klein
    Vice President of Sales and Marketing, Certified Security Solutions, Inc.

    Tom leads CSS strategy at Certified Security Solutions related to client project planning and sales execution. He interfaces closely with clients, executive leadership, and the product development team to ensure that clients are presented with the most current and relevant information about secure digital identity and access for IOT and the enterprise. Tom brings over 38 years of experience with leadership roles with Fortune 1000 clients at IBM and Microsoft.

     

     

     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### April CISO Forum Washington DC 2017 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    April CISO Forum Washington DC 2017

    ISSA_CISO_FORUM_Web_Banner_D.jpg

    Theme  |  Registration  |  Hotel Reservations & Transportation  |  Agenda  |  Sponsors



    Theme: Information Security, Privacy and Legal Collaboration

    Date: April 20-21, 2017
    Location: Hotel Monaco, 700 F Street SW, Washington D.C. 20004

    CISOs are encouraged to bring their General Counsel or Chief Privacy Officer to this event for a collaborative learning experience. 

    Information Security, Privacy and Legal programs must be closely aligned to be successful in today’s world. Customer and vendor contracts require strong security language. Privacy has moved to the forefront of a global stage. Response to data breaches are often coordinated through Legal departments to protect privilege. Increasing global regulations drives change to Information Security and Privacy practices. Join your Information Security, Legal and Privacy leadership peers to discuss timely issues in these areas.
    Note:  This CISO Executive Forum directly follows the IAPP Global Privacy Summit being held within walking distance on April 19-20.  Consider taking advantage of this opportunity to attend both events!

    Registration:

    Type Fees and Benefits Registration Link
    ISSA CISO Executive Members

    Complimentary meeting registration and one complimentary night of hotel accommodations*

    click here to register

    learn about CISO Executive Membership here
    First Time CISO Guests or General Counsel/ Privacy Officer Guests Complimentary meeting registration click here to apply
    (attendance is subject to approval)
    Returning Guests $400 click here to apply**
    (attendance is subject to approval)

    *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

    **Upon verification of eligibility, guest will be invoiced for the $400 registration fee


    Hotel Monaco:

    Click here to reserve your room at the Hotel Monaco. The daily rate is $289 plus state and local taxes. Reservations are available until March 31, 2017 or until the block sells out, whichever comes first. Space is limited.

    Transportation:
    New to Uber? Join here to earn up to $15 off your first ride!

    Agenda:

    April 20, 2017


    4:30 p.m. - 5:00 p.m.

    Registration and Cocktails

     5:00 p.m. - 7:00 p.m.

    Multijurisdictional Conflicts Under a New Security Landscape
    Dr. Adriana Sanford: Chilean-American Author | Professor | AI USA Board of Directors | International Corporate Lawyer | WEF (PACI) Advisory Committee | Media

    7:00 p.m. - 9:30 p.m.

    Opening Dessert Reception at the Spy Museum
    Sponsored by HP, Inc.


    April 21, 2017

     

    8:00 a.m. - 8:50 a.m.

    Registration and Breakfast

    8:50 a.m. - 9:15 a.m.

    Opening Comments and Welcome Address

    9:15 a.m. - 10:30 a.m.

    Think Your Network is Safe? Check All Your Endpoints, Download PDF
    Michael Howard: WW Senior IT Security Consultant, HP
    Sponsored by HP, Inc.

    10:30 a.m. - 11:00 a.m.

    Networking Break

    11:00 a.m. - 12:00 p.m.

    Key Policy and Legal Issues for CISOs, Download PDF
    Peter Swire: Senior Counsel, Alston & Bird, US Privacy Czar, Professor of Law and Expert on Privacy and Cybersecurity 

    12:00 p.m. - 1:15 p.m.

    Lunch

    1:15 p.m. - 2:15 p.m.

    Mock Incident Response Exercise, Download PDF
    Phyllis Sumner: Partner at King and Spalding

    2:15 p.m. - 2:30 p.m.

    Networking Break

    2:30 p.m. - 3:30 p.m.

    Cybersecurity in the Trump Administration
    Robert Knake: Former Director for Cybersecurity Policy on US National Security Council

    3:30 p.m. - 3:45 p.m.

    Networking Break

    3:45 p.m. - 4:00 p.m.

    Sponsor Prize Drawing

    4:00 p.m. - 5:00 p.m.

    The Inspector General's Emerging Role in Privacy, Download PDF
    Theresa Grafenstine: Inspector General of the US House of Representatives

     

    Questions? Please contact Leah Lewis: 1 866 349 5818 extension 4082.

    Sponsors:

    For sponsorship opportunities, please contact Joe Cavarretta: 1 866 349 5818 extension 4095.



          

       


    Presentation Title: TBA
    Speaker: TBA

    Presentation Title: TBA
    Speaker: TBA

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### June 2016 ISSA Web Conference - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    June 2016 ISSA Web Conference




    Legislative Impact: When Privacy Hides the Guilty Party
    2-Hour live presentation recorded June 28, 2016
    Click here
    to view the recording.

    Click here to take the CPE quiz.

    Overview:

    Increasingly legislation and regulation are becoming extremely important drivers for what information security professionals have to do, and the pace of delivery seems to be increasing wherever you work in the world today.

    What are organizations and individuals approaches to what and how they do information security? How do we prioritize what is most important? What can we do to make compliance easier? How do we get our policies aligned with the differing regulatory environments across different jurisdictions? How do we deal with export controls (software and information)? In some cases the question might be – How do we stay out of jail? Join our industry experts to get their views and this topic and the questions around it.


    Moderator:

    Allan Wall

    Senior Consultant, Information Risk Management, HP Enterprise Security Services

    Allan Wall has been working in the IT industry for more than 25 years, and 19 of those years includes experience in the field of information security as a practitioner and manager. He has been involved in the project management of numerous security software implementations, development and integration of information security policy, product training, and pre and post sales security consulting for many international and UK enterprises.

    Allan appears regularly as a presenter at information security events and as a workshop facilitator. He has been a guest lecturer for the MSc in Information Security at Royal Holloway University of London where he completed studying full-time for a Masters in Information Security in 2010.

    A CISSP for more than 12 years, he is a Founder Associate Member of the Institute of Information Security Professionals, a Fellow of the British Computer Society, and a part of the ISSA UK Chapter management team. In addition to his Masters in Information Security, Allan has a BS in Biochemistry and Genetics and a Post-Graduate Certificate in Education from Newcastle University (UK).


    Speakers:

    Tim Holman

    Cyber Security Consultant and CEO of penetration testing specialists 2-sec Ltd

    Award-winning, internationally recognized Cyber Security Consultant. Recipient of the coveted Microsoft MVP for Security Award in 2004, 2005 and 2006, and in 2014 awarded Fellowship of the Information Systems Security Association (ISSA).

    His 20+ year professional career has included consulting roles at IBM, Panasonic, British Airways, Lloyds TSB, ICL (Fujitsu), Dimension Data and Trustwave, and in 2011 he founded 2-sec, a leading UK-based Cyber Security Services firm.

    From 2010-2014, he was President of the ISSA-UK Chapter, and served on the International Board of ISSA from 2014-2016.

    His advice has been featured in national newspapers such as The Times and The Guardian, top industry publications – Computer Weekly, BBC radio, SC Magazine and on many blogs and support forums, including Experts Exchange, where he was a founding contributor back in 1998.

    Tim has spoken at many information security trade shows – ISSA, RSA Conference, Infosec, SC Congress, PCI London, DRMFS, Westminster eForum, PCI SSC Community Meetings, and is regularly sought by the press for comment on global Cyber Security issues.


    Roszel C. Thomsen II

    Technology Lawyer and Partner at Thomsen & Burke LLP

    Roszel C. Thomsen II concentrates on international trade and investment law, with emphasis on representing information technology and life sciences companies and their trade associations in regulatory, legislative and enforcement matters.

    Mr. Thomsen is listed in The Best Lawyers in America, a co-author of United States Export Controls, and an editor of the Journal of Internet Law. He is a member of the Steering Committee on the Federal Bureau of Investigation’s Information Technology Study Group, a member of the Commerce Department, Bureau of Industry and Security’s Information Systems Technical Advisory Committee, and has participated twice as an Industry Representative on the United States Delegation to the Wassenaar Arrangement in Vienna, Austria.

    Mr. Thomsen holds an A.B. from Harvard University, a J.D. from American University and an M.A. from American University and holds Bar Admissions for the State of Maryland, the District of Columbia and various Federal Courts.


    Araceli Treu Gomes


    Araceli Gomes is Subject Matter Expert in Intelligence and Investigations at SecureWorks, where she counsels global organizations on preventing advanced attacks. She is also cohost of The Irari Report. Previously, she held technical and leadership positions including strategic security advisor for a Fortune 100 company, engineering director at a large defense contractor, deputy CSO for a multinational financial services organization and Chief Security and Privacy Officer at a major content delivery network. She designed DDoS, extrusion prevention and network forensics tools for Internet backbone providers. She holds certifications in privacy and computer forensics, and serves on IEEE Cybersecurity SIGs and ISSA boards locally and nationally.

     

     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### July 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference January 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    July 2018 ISSA Web Conference




    ISSA Thought Leadership Series: Is DNS a Part of Your Cyber Security Strategy?

    Recorded (1 Hour Event) on Wednesday, July 11, 2018

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    Detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks, being part of a data loss prevention program – DNS can help with this and much more, but are you leveraging it as part of your security controls and processes?

    DNS is the perfect choke point to stop not just data exfiltration through it, but also detect and stop malware from spreading and executing.

    Join us for a discussion on this often overlooked topic and learn:

    - About the value of DNS as part of your cyber security strategy
    - How DNS can provide your SIEM with actionable intelligence
    - How DNS can add value to other security controls, such as
    vulnerability scanners and end point protection

     

    Moderator:

    Kurt Seifried, Director of IT, Cloud Security Alliance

    Kurt Seifried is a long time technologist and currently works as the Director of IT for the CloudSecurityAlliance. With respect to DNS his personal domain is now over 20 years old, and despite using cloud services Kurt still speaks semi-fluent Bind configuration and has written several articles on DNS security, for both servers and clients.



    Speakers:

    Joe St Sauver, Distinguished Scientist, Farsight Security

    Joe St Sauver, Ph.D., is a Distinguished Scientist with Farsight. Before joining Farsight in 2014, St Sauver spent ~28 years with the University of Oregon, including working as Internet2’s Nationwide Security Programs Manager. He's a Senior Technical Advisor for M3AAWG, and routinely advises a number of other international security organizations.


    Craig Sanderson, Senior Director, Product Management, Infoblox Security

    Craig Sanderson is the Senior Director of Product Management for Infoblox Security Solutions. Craig has been in the security industry for 19 years in a number of roles including Technical Consultant, Solution Architect, Product Manager and Business Development manager. Having worked on a range of security technologies, Craig is now focused on developing solutions that prevent the abuse of DNS and enabling customers to leverage their network infrastructure to better secure their data, assets and people.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### June 2018 ISSA International Series Web Conference - Information Systems Security Association ISSA International Web Conference January 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    June 2018 ISSA International Series Web Conference




    ISSA International Series: Cloud Services and Enterprise Integrations

    Recorded (2 Hour Event) on Tuesday, June 27, 2018

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    Securing cloud environments is a shared responsibility between your organization and your cloud service provider. But upholding your end of the bargain can be a challenge in these dynamic, complex environments — especially when dealing with a mix of physical networks and public and private clouds. In this webinar, we will discuss issues and strategies for handling Cloud Services and Enterprise Integrations. Amongst the topics covered we will attempt to address the issues of:

    - How do cloud services impact security implementations?

    - Who is responsible for defining security and how does one implement a security management program in an integrated enterprise cloud service environment?

    - What transitional issues may occur during your migration? How do you audit a cloud service?

    Register for the webinar to see the issues and benefits of handling cloud services and enterprise integration.

     

    Moderator:

    Michael F. Angelo - Chief Security Architect, Micro Focus | NetIQ

    Michael F. Angelo CRISC, CISSP has over 30 years of information assurance experience. Michael has served as a trusted security advisor and security architect with leading corporations and government entities. He has acted as a technical adviser in the development of US national and international export controls. Currently chairs the ISSA International Webinar committee. Amongst his accomplishments he is an ISSA Fellow, and is named on the ISSA Hall of FAME for his contributions to the security community. In addition, he currently holds 61 US Granted Patents. His current work encompasses certifications, SDL, Threat Modeling, AppSec / DevOPS, as well as and Software Supply Chain analysis. Michael is a veteran moderator and has appeared at numerous International conference and in a multitude of International Web Conferences.


    Speakers:

    Mark Kadrich

    For the past 30+ years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. His strengths are in architecture level design and review, solution design and efficacy, policy generation, endpoint security, and risk management. Mr. Kadrich is the author of the book Endpoint Security published by Addison Wesley. Mr. Kadrich holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering. He was a contributing author in publications such as Healthcare Technology Online, Health IT Outcomes, TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, SANS and The Black Hat Briefings. Mark Kadrich is a well- known speaker and

    evangelist on network security matters at technical conferences and security events. He was the program manager and chair for Cornerstones of Trust for 3 years. Mr. Kadrich has been a CISO, CSO, CEO, Chief Scientist, Corporate Minion, and Security Slave. He is presently a Free Range CISO helping customers create and manage security IT environments.

     

    Vincent A. Campitelli II

    Vince has extensive experience in the converged fields of information technology and risk management. As a Regional Partner with Coopers & Lybrand (now PWC) he was a member of a small team of partners who led the adaptation of technology into the traditional fields of accounting and auditing. Post public accounting, he applied his mastery of risk management and technology with leading Wall Street and Healthcare organizations including Salomon Smith Barney, Goldman Sachs and McKesson Corporation. He developed and designed risk-based continuous improvement processes to monitor IT business systems and applications that resulted in improvements in operational performance and the reduction in outages and control deficiencies. Most recently, Vince has been consulting with the Office of the CEO of the Cloud Security Alliance (CSA) in supporting enterprise members apply CSA Security Guidance and Research results into their Cloud adoption and implementation programs.

    Stephen E. Lipka, PhD, CRISC, CISSP

    With over 10 years of information security experience, and decades of IT leadership and consulting experience, Dr. Stephen Lipka has developed a keen sense of what’s most important in protecting each organization’s information assets. In his current practice as a consulting CISO, Steve builds effectiveness in his clients’ information security programs and teams, all in the interest of protecting his clients’ profitability. Prior to his consulting practice, Steve served as CISO for Cushman & Wakefield, a global commercial real estate services firm. At C&W, he built the security and risk management program from the ground up. For that work, he was awarded NJ Technology Council’s 2016 CISO of the Year for privately held for-profit companies. Steve holds Bachelor’s and Master’s degrees from Polytechnic Institute of NY (now NYU), a PhD in computer science from SUNY Stony Brook, and CISSP and CRISC certifications.

    Michelle Johnson Cobb, Chief Marketing Officer, Skybox Security

    Michelle Johnson Cobb is the chief marketing officer for Skybox™ Security, a global leader in cybersecurity management. She helps to lead the company’s growth in more than 50 countries. For more than 15 years, Cobb has held executive roles in computer security, networking and enterprise software companies, including McAfee, Tumbleweed Communications and several startups. She received her MBA with high distinction from the University of Michigan Ross School of Business and a Bachelor of Science in Computer Science also from the University of Michigan.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### October CISO Forum Atlanta, GA 2018 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    October CISO Forum Atlanta, GA 2018


    Theme  |  Registration  |  Hotel Reservations & Transportation  |  Agenda  |  Sponsors


    Security, Legal and Privacy Collaboration
    Date: October 18-19, 2018
    Location: Atlanta, GA

    Information Security, Privacy and Legal programs must be closely aligned to be successful in today's world. Customer and vendor contracts require strong security language. Privacy has moved to the forefront of a global stage. Response to data breaches are often coordinated through legal departments to protect privilege. Increasing global regulations drives changes to Information Security and Privacy practices. Join your Information Security, Legal and Privacy leadership peers to discuss timely issues in these areas.

    CISOs are encouraged to bring their General Counsel or Chief Privacy Officer to this event for a collaborative learning experience. 

    Registration:

    Type Fees and Benefits Registration Link
    ISSA CISO Executive Members

    Complimentary meeting registration and one complimentary night of hotel accommodations*

    click here to register

    learn about CISO Executive Membership here
    First Time Guests Complimentary meeting registration click here to apply
    (attendance is subject to approval)
    Returning Guests $400 click here to apply**
    (attendance is subject to approval)

    *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

    **Upon verification of eligibility, guest will be invoiced for the $400 registration fee

     

    Hotel:

    Venue:
    The Westin Peachtree Plaza Hotel
    210 Peachtree St NW
    Atlanta, GA 30303

    Click here to reserve your room at the Weston Peachtree Plaza Hotel. The daily rate is $199 plus resort fee and state and local taxes. Reservations are available until September 30, 2018 or until the block sells out, whichever comes first. Space is limited.

    Transportation:
    New to Uber? Join here to earn up to $15 off your first ride!

     

    Agenda:

    October 18, 2018


    5:00 p.m. - 8:00 p.m.

    Opening Dinner
    Candy Alexander,
    President, ISSA International Board of Directors


    October 19, 2018

     

    8:00 a.m. - 8:50 a.m.

    Registration and Breakfast

    8:50 a.m. - 9:15 a.m.

    Opening Comments and Welcome Address

    9:15 a.m. - 10:15 a.m.

    Decentralized Workforce
    Michael Wylie, Corporate Blue

    10:15 a.m. - 10:45 a.m.

    Networking Break

    10:45 a.m. - 11:45 p.m.

    Partnerships to Protect our Information
    Kathy Fithen,
    Managing Principal Consultant, SecureWorks; Former Privacy Officer, Coca-Cola

     11:45 a.m. - 12:00 p.m.  Wisegate

    12:00 p.m. - 1:00 p.m.

    Lunch

    1:00 p.m. - 2:00 p.m.

    Maximizing your Privacy Governance - GDPR vs. California Consumer Privacy Act
    Lucia Milica,
    CEO & Principal Consultant, Datassure

     2:00 p.m. - 3:00 p.m.  Presentation
    Name:
     Dr. Shawn Murray, Director, ISSA International Board of Directors

    3:00 p.m. - 3:30 p.m.

    Networking Break

    3:30 p.m. - 5:00 p.m.

    VC Panel:
    Moderator:
     Shawn Murray, Director, ISSA

    Panel: Chenxi Wang, Rain Capital

                Kareem Aly, Thomvest Ventures

    5:00 p.m. - 5:15 p.m.

    Sponsor Prize Drawing

    5:15 p.m. - 6:15 p.m.

    Closing Reception


    Questions? Please contact
     Member Services: +1 (703) 382-8205 (local/international)

     

    Sponsors:

    For sponsorship opportunities, please contact  Sean Bakke.





          

       
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### October 2016 ISSA International Web Conference - Information Systems Security Association October 2016 ISSA International Web Conference
    Contact Us   |   Print Page   |   Sign In   |   Register
    October 2016 ISSA International Web Conference




    How To Recruit and Retain Cybersecurity Professionals

    Recorded Live Tuesday, October 25, 2016

    Click here to view the recording.
    Click here to take the CPE quiz.

    Overview:

    We have all heard the term "Cybersecurity talent shortage." With information security rising as one of the quickest growing industries, there are more jobs than there are qualified candidates. This creates a difficult HR environment and tends to lead to a high level of turnover. How can businesses recruit, but just as importantly, retain, key cybersecurity personnel?

    In this two hour ISSA International web event, industry professionals will share their experiences and provide real world feedback regarding one of the most challenging issues facing the information security field. Additionally, we will explore the results of a comprehensive employment study performed by ISSA and ESG earlier this year. What does the data collected in the survey tell us about the current and future security job markets, and how can you apply these findings to your business operations?


    Moderator:

    Hari Pendyala

    Hari has 20+ years of experience in Information Security. He is currently working as COO of 7inQ, an Incubator based out of India. Hari is a CISSP, CISM and ITIL v3 Certified professional and is an Information Systems Security Association (ISSA) International Fellow. He is currently serving as Vice- President, iTAAP, IT Association of Andhra Pradesh, India. He has Master’s in Computer Engineering from Florida Atlantic University and Bachelor's in Electrical and Electronics Engineering from SVU College of Engineering.


    Speakers:

    Erin Hanson, Director of Client Experience, InfoSec Connect

    Erin has been involved in people analytics and professional recruiting for federal government contractors for over 20 years. Erin’s experience includes recruitment of highly specialized doctorate level skill sets in support of energy research positions including life sciences, physical sciences, IT/Cyber and specialized engineering fields. Additionally, Erin has experience in business analytics, proposal writing, program development/administration, and business development roles. Her experience offers demonstrated abilities in managing and developing solution oriented proposals and programs.

     

    Erin is a graduate of University of Idaho with a Bachelors in General Studies with an emphasis in Industrial Technology. She is certified as a Global Professional in Human Resources. Erin’s degree emphasis in industrial technology and broad experience in technical recruiting provides her with a strong technical terminology and understanding of skill sets in multiple science, technology, engineering, and math fields. 


    Candy Alexander

    Candy has nearly 30 years in the security industry working for companies such as Digital Equipment, Compaq Computer Corporation, and Symantec. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed Corporate Security Programs. She is now working as a Virtual CISO and Cyber Security consultant.

    Candy is the chief architect for the Cyber Security Career Lifecycle for the ISSA (Information Systems Security Association), and until recently she served a Director for 14 years on the International Board. She is also the past President and current Board Member of the ISSA Education and Research Foundation. Candy has also served as Vice President of Education and Vice President of International Relations for the ISSA. She remains a loyal member at the local level with the New England Chapter and the ISSA - New Hampshire Chapter.

    Candy has received numerous awards and recognition, including that of Distinguished Fellow of the ISSA, ranking her as one of the top 1% in the association, and she was inducted into the ISSA Hall of Fame in 2014. She also had the opportunity to be a featured speaker for the IT Security Symposium at the United Nations, and even received an invitation to the Offices of the White House to speak on the importance of security awareness to the President's "Cyber-Czar" staff.


    Kim Jones

    Kim L. Jones is Director, Cybersecurity Education Consortium, Arizona State University and has been an intelligence, security, and risk professional for over 25 years. A sought-after speaker and industry thought leader, Jones has built, refined, and/or managed security programs in the financial services, healthcare, manufacturing, outsourcing and defense industries.

    Jones has a bachelor’s degree in computer science from the U.S. Military Academy at West Point, a master’s degree in information assurance from Norwich University and holds the CISM, CISSP, and CRISC certifications. He is a member of the CISO Advisory Council for ISSA International.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### March CISO Forum San Francisco, CA 2019 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    March CISO Forum San Francisco, CA 2019


    Theme  |  Registration  |  Hotel Reservations & Transportation  |  Agenda  |  Sponsors


    Innovation & Technology, Escape from RSA Conference!
    Date: March 2-3, 2019
    Location: San Francisco, CA

      

    This year we provide you an opportunity to “escape from RSAC & buzzword bingo” and invite you to the ISSA CISO Executive Forum! We will provide a haven away from the vendor noise and product churn to have real conversations and get beyond the latest tech lingo. 

     

    This is a CISO and security practitioner-driven event focused on benefiting our CISO members and qualified guests. The ISSA CISO Executive Forum is your chance to escape from the blizzard of buzzwords to meet up with your cyber-security and risk management peers, industry experts, and a specially selected security vendors in a relaxed and confidential environment. We discuss real security programs, share real-world scenarios, and learn from each other.

     

    We have brought back our very popular VC (Venture Capital) Panel session into this year’s event as well.

     

    Finally, attendees at the March 2019 event will have a chance to help shape the content and format for future meetings of the ISSA CISO Executive Forum in 2019 and beyond.

     

    We look forward to seeing you at this year's event in San Francisco!

     

    Warm Regards,

    - Wendy Cohen & John Donovan

    ISSA CISO Executive members and Co-chairs for the March 2019 CISO Forurm event.

     

    A message from your ISSA International CISO Exec committee chair, Dr Shawn Murray:

    Earlier this year an assessment was requested and conducted on a company because they could not find a rogue device on their network. The assessment was halted and a meeting ensued between HR, Legal and the assessment team. It was suggested by the team that the organization update their BYOD policy. The rogue system was determined to be a sexual device on their network and they figured it would be riskier to pinpoint the device and user than the recommended solution. The business was surprised, stunned and thankful for the discretion.

     

    In another instance, a CISO from a 43-billion-dollar health care provider responded to a serious incident involving two of their physicians. The doctors had purchased and integrated Google Glasses with a collaboration platform that extended their exam room environment with a medical academic institution in India. The doctors performed diagnosis and treatment on patients who had no knowledge of what the technology was being used for and had not provided consent for broadcasting their treatment with the students in India. The lawsuit is still pending…

     

    Today, CIOs, CISOs and Compliance Officers are struggling to keep up with the risks that new and innovative technologies bring to the organization. With the onset of IoT and Artificial Intelligence (AI), organizations need to understand risk, lead and provide support for those that are charged with balancing the needs of the business with the conveniences that new technology brings.

     

    Registration:

    Type Fees and Benefits Registration Link
    ISSA CISO Executive Members

    Complimentary meeting registration and one complimentary night of hotel accommodations*

    click here to register

    learn about CISO Executive Membership here
    First Time Guests Complimentary meeting registration click here to apply
    (attendance is subject to approval)
    Returning Guests $400 click here to apply**
    (attendance is subject to approval)

    *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

    **Upon verification of eligibility, guest will be invoiced for the $400 registration fee

     

    Hotel:

    Venue:
    Marines' Memorial Club & Hotel
    609 Sutter Street
    San Francisco, CA. 94102

    To reserve your room at the Marines' Memorial Club & Hotel, please contact member services at +1 (703) 382-8205 (local/international)The daily rate is $279 plus resort fee and state and local taxes. Reservations are still available but space is limited.

    Transportation:
    New to Uber? Join here to earn up to $15 off your first ride!


    Agenda:

    March 2, 2019


    5:00 p.m. - 9:00 p.m.

    Opening Dinner
    Presenter: Philippe Courtot, Chairman & CEO, Qualys, Inc.


    March 3, 2019

     

    8:00 a.m. - 9:00 a.m.

    Registration and Breakfast

    9:00 a.m. - 9:30 a.m.

    Opening Comments and Welcome Address

    9:30 a.m. - 10:30 a.m.

    Practical Patterns to Build Your Cloud Security Strategy
    Maxime Rousseau,  CISO, Personal Capital

    10:30 a.m. - 11:00 a.m.

    Networking Break

    11:00 a.m. - 12:00 p.m.

    Securing Robots at Scale, from Edge to the Cloud and Everything in Between

    Talha Tariq, CISO, Anki

    12:00 p.m. - 1:00 p.m.

    Lunch

    1:00 p.m. - 2:30 p.m.

    Presentation: VC Panel
    Moderated by: Pete Lindstrom, Research Vice President, Security Strategies

    Panelists:

    Patrick Heim, Operating Partner & CISO, ClearSky
    Will Lin, Principal and Founding Investor at ForgePoint Capital
    Rohit Gupta, Serial Entrepreneur, Active Angel Investor & Venture Limited Partner

     2:30 p.m. - 3:00 p.m. Networking Break

    3:00 p.m. - 4:00 p.m.

    Innovation Exercise
    An interactive exercise for participants on technology and innovation

    4:00 p.m. - 4:40 p.m.


    Defining Defense in Depth: Start with What Matters
    Mike Pedrick, CISSP, CISM, vCISO | IT/IS Strategy | Mentor

    4:40 p.m. - 5:00 p.m.

    Sponsor Prize Drawing

    5:00 p.m. - 6:00 p.m.

    Closing Reception


    Questions? Please contact
     Member Services: +1 (703) 382-8205 (local/international)

     

    Sponsors:

    For sponsorship opportunities, please contact the ISSA Sponsorship Team at sponsor@issa.org

     

    Platinum Level Sponsors



          

       
     Silver Level Sponsor  
       
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### May 2017 ISSA International Web Conference - Information Systems Security Association ISSA March 2017 Web Conference
    Contact Us   |   Print Page   |   Sign In   |   Register
    May 2017 ISSA International Web Conference

     

    ISSA International Web Conference: Breach Report Analysis

    Recorded Live: Tuesday, May 23rd, 2017 

    Click here to access the recording
    Click here to take the CPE quiz.
    Click here for a copy of the slides

    Overview:

     

    Once again, the new data breach reports are published. Are we, as security professionals, succeeding in protecting our assets? This session will review the latest breach reports, provide insight into current trends, and evaluate potential solutions.

    Moderator:

    Michael Angelo


    Speakers:

    Dr. Larry Ponemon - Dr. Larry Ponemon is Chairman and Founder of Ponemon Institute. Because of his expertise in information security and data privacy, he has served on the Advisory Committee for Online Access & Security for the United States Federal Trade Commission and the Data Privacy and Integrity Advisory Committee for the DHS.

    Dr. Ponemon has held chaired faculty positions and written numerous articles and learned books. He has served as founding member of the Certified Information Privacy Professional (CIPP) Advisory Board. Dr. Ponemon has a Ph.D. from Union College and a Master’s degree from Harvard University. He attended the doctoral program in system sciences at Carnegie Mellon University. Dr. Ponemon earned his Bachelors with Highest Distinction from the University of Arizona. He is a CPA and a CIPP.


    Bhavesh Chauhan - Principal Client Partner - Security Evangelist within Verizon CTO organization. Previously lead the Security Engineering and Professional services for the North East Region of Americas, which includes Enterprise, Government and Education customers for Verizon. Bhavesh has over 15 plus years in Cyber Security and Business Continuity Solutions. Bhavesh has served as an Information Security officer, Government Accreditor, Security Principal, Consultant, Engineer and Architect on security engagements; and has delivered various information security engagements to assist customers mitigate risks and improve security maturity across the enterprise. Bhavesh routinely represents Verizon at information security forums and has delivered various public speaking engagements. He is a board member of the ISACA local chapter. Along with his experience, Bhavesh holds a Master’s of Science Degree in Physics and a number of professional security certifications such as CISSP, CISA, and CISM. Furthermore, he has been a CESG certified Information Assurance advisor to UK public sector from 2001 to 2010.

    Yolonda Smith - Director of Product Management - Pwnie Express, is responsible for the development and launch of solutions, features and capabilities which provide security professionals with the visibility they need to identify, characterize and neutralize threats from the wired and wireless devices in their environments. A security professional herself, she spent 8 years in the United States Air Force as a Cyberspace Operations Officer with duties and responsibilities varying from Mission Commander, Advanced Network Operations where her team developed & orchestrated the first DoD Cyber Hunting missions to Flight Commander, Cyber Defense Capabilities Development where her team developed the first and only malware neutralization tool for Predator Drones.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### May 2016 ISSA Web Conference - Breach Report Analysis - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    May 2016 ISSA Web Conference - Breach Report Analysis






    Breach Report Analysis--SWOT or SWAT?

    Recorded Event: Tuesday, May 24, 2016



    Click here to view the recording.
    Click here to take the CPE quiz.
    Click here to view the slides.

    Overview:

    Once again, the new data breach reports are published. Are we, as security professionals, succeeding in protecting our assets? This session will review the latest breach reports, provide insight into current trends, and evaluate potential solutions.


    Moderator

    Jorge Orchilles

    Author of Microsoft Windows 7 Administrator's Reference, Jorge Orchilles holds a Master's of Science in Management Information Systems from Florida International University. Jorge leads the Advanced Penetration Testing & Vulnerability Assessment Quality Control teams in a large financial institution and serves as Director of the ISSA South Florida Chapter.


    Speakers

    Kevin Haley

    Director, Symantec Security Response

    Kevin Haley is Director of Product Management for Symantec Security Technology And Response where he is responsible for ensuring the security content gathered from Symantec’s Global Intelligence Network is actionable for its customers.  He is the technical advisor and main spokesperson for Symantec Internet Security Threat Report.  He served as a technical advisor for Anthony E. Zuiker's digital crime thriller, “Cybergeddon” and appeared in the documentary “Most Dangerous Town”. He also frequently appears as a security expert for media including The Today Show, NBC Nightly News, Good Morning America, MSNBC, USA Today, New York Times, Forbes, Dow Jones and many others.  During his sixteen years at Symantec, Haley has also acted as the Group Product Manager for Symantec Endpoint Protection and our mail security products.  


    Bhavesh Chauhan

    Principal Client Partner - Verizon

    Bhavesh Chauhan is a Principal Client Partner - Security Evangelist within the Verizon CTO organization. Previously a Principal in Financial Services and lea the Security Engineering and Professional services for the North East Region of America, which includes Enterprise, Government and Education customers for Verizon. Bhavesh has over 15 plus years in Cyber Security and Business Continuity Solutions. Bhavesh has served as an Information Security officer, Accreditor for Government Classified systems, Security Principal, Engineer and Architect on security engagements; and has delivered various information security engagements to assist customers mitigate risks and improve security maturity across the enterprise. Bhavesh routinely represents Verizon at information security forums and has delivered various public speaking engagements. He is a board member of the ISACA local chapter.

    Along with his experience, Bhavesh holds a Master’s of Science Degree in Physics and a number of professional security certifications such as CISSP, CISA, and CISM. Furthermore, he has been a CESG certified Information Assurance advisor to UK public sector from 2001 to 2010.


    Pete Lindstrom

    Research Vice President for Security Strategies - IDC

    Pete Lindstrom is Research Vice President for Security Strategies. His research is focused on digital security measurement and metrics, digital security economics, and digital security at scale. Mr. Lindstrom is responsible for driving the vision of enabling digital transformation through proper technology risk management that makes efficient and effective economic decisions supported by evidence and outcome analysis leading to a security model that aligns with the 3d platform.

    Prior to joining IDC in 2014, Mr. Lindstrom accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the "Four Disciplines of Security Management" (a security operations model), and the "5 Immutable Laws of Virtualization Security," which was integrated into guidance from the PCI Council.

    Mr. Lindstrom is a frequent contributor to popular business and trade publications. He is often quoted in USA Today, WSJ Online, Information Security Magazine, VAR Business, Searchsecurity.com, and CSO Magazine. His columns and articles have appeared in Information Security Magazine, Searchsecurity.com, ISSA Journal, and CSO Online. Additionally, Mr. Lindstrom is a popular speaker at the RSA Security Conference, InfoSec World, ISSA International Conference, and many regional conferences.

    In addition, to his extensive industry experience, Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.



    The May 2016 ISSA International Web Conference is generously sponsored by

    Click here to read Symantec's recently released 2016 Internet Security Threat Report




    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### September 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference September 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    September 2018 ISSA Web Conference




    ISSA International Series: Latest & Greatest Security Attacks & Why They Happen

    Recorded (2 Hour Event) on Tuesday, September 25, 2018

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    With all the money that we spend on precautions, and mitigations for security vulnerabilities, why do we keep on getting hacked? This question is not new, but will be looked at with respect to recent attacks, that have been successful. While not all of these attacks are brand new or represent unique vulnerabilities, they've been very effective. So come and join us as we look at the issues that are being exploited.


     

    Moderator:

    Michael F. Angelo, Chief Security Architect, Micro Focus | NetIQ

    Michael F. Angelo CRISC, CISSP has over 30 years of information assurance experience. Michael has served as a trusted security advisor and security architect with leading corporations and government entities. He has acted as a technical adviser in the development of US national and international export controls. Currently chairs the ISSA International Webinar committee. Amongst his accomplishments he is an ISSA Fellow, and is named on the ISSA Hall of FAME for his contributions to the security community. In addition, he currently holds 61 US Granted Patents. His current work encompasses certifications, SDL, Threat Modeling, AppSec / DevOPS, as well as and Software Supply Chain analysis. Michael is a veteran moderator and has appeared at numerous International conference and in a multitude of International Web Conferences.



    Speakers:

    Dan Hoffman, Global Head of Solution Architects, Agari

    Daniel V. Hoffman, CISSP, CEH, CHFI is Agari's Global Head of Solution Architects, author of two security books , inventor of numerous security patents, former CTO and former head of SMobile's Global Threat Center mobile device security research facility and author of the attack scenario for Cybershockwave, the simulated attack against the U.S. infrastructure covered live by CNN. His work has been featured in the curriculum of Universities throughout the world and he has been relied upon for his expert opinion by all forms of media including The Wall Street Journal, USA Today, Financial Times, Fox Business, MSNBC, CBS Radio and Forbes.

     

    Fred Wilmot, VP, Security Engineering, Devo

    Fred brings more than 20 years of cyber security expertise to the fight. Currently, he leads security engineering at Devo, integrating today’s threats and countermeasures into Devo’s platform. Most recently, he acted as both CEO and CTO at PacketSled building both a cloud and on-premise product for breach responders and service providers to automate risk mitigation and investigation. Previously, he served as Vice President, Solutions Engineering at Context Relevant, where he implemented a real-time transaction fraud platform for financial markets, weaponizing security use cases with data science automation and machine learning.
    During Fred’s tenure at Splunk, he was responsible for the company’s ascension to a market leader in the security industry, placing the company in the Gartner SIEM magic quadrant. As the founder and director of the global security practice, Fred prototyped innovation in the field, and built platform applications that were utilized in responding to some of the most major breaches in Internet history.
    Prior to Splunk, Fred has held numerous security positions with major brands including Symantec, Disney, T-Mobile, and IBM. Fred attended the US Naval Academy and holds a BS in Mathematics and History from FSU.

     

    James McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy

    James R. McQuiggan, CISSP is the Product & Solutions Security Officer of the Service Americas division at Siemens Gamesa Renewable Energy. He is responsible for developing the strategy and policies for securing the SCADA products deployed to America’s customers. With over 17 years at Siemens, James has consulted and supported various corporate divisions on cybersecurity standards, information security awareness and securing their networks.
    James is an ISSA member and the Past President of the Central Florida chapter from 2012 to 2016. He supported the ISSA International Conference as the Content Committee Chair from 2014 to 2017. He is a member of the Central Florida chapters of ISACA, Infragard and (ISC)2. Within (ISC)2, he is a member of the Advisory Council of North America and is the (ISC)2 Central Florida chapter President. James is the recipient of the 2016 (ISC)2 President’s Award and in 2017 he was awarded the first ever Julie Peeler Franz “Do it for the Children Award” as Volunteer of the Year for his work with the Safe & Secure Online Education program, that provides resources to help children, parents, educators and senior citizens stay safe online.
    Most importantly, James is the father of two teenage daughters and continues to make sure they are safe and secure online while using their smartphones and social media.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### July 2015 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    July 2015



    Network Security Testing --
    Are There Really Different Types of Testing?


    Click here to view the live recording of the July 28, 2015.
    Click here
    to view the slide deck.
    Click here
    for CPE Quiz.

    Sponsored by:

    Overview:
    Attend this webinar to learn about the different kinds of security testing efforts that are commonly conducted in enterprise networks. This webinar will also cover the benefits of security resilience and associated testing for enterprises.


    Moderator:

    Jorge Orchilles
    Vice President, Sough Florida ISSA
    Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Masters of Science in Management Information Systems from Florida International University, leads the Advanced Penetration Testing & Vulnerability Assessment Quality Control teams in a large financial institution and serves as Vice President of the Information Systems Security Association South Florida Chapter.


    Speakers:

    Eric Raisters
    CISSP, CSSLP
    Eric was most recently the Manager of Secure Software Development at Attachmate Corporation and has more than 18 years of testing and development experience with Attachmate’s security products. He has worked with all Attachmate product teams to collaboratively incorporate secure development practices into their software development methodologies through educating the development teams on all aspects of SDLC. He also initiated and coordinated Attachmate’s vulnerability management and publication team and processes. Eric previously worked as a geophysicist on the oil industry and has degrees in geology and oceanography.

    Donald Shin
    Sr. Technical Business Development Manager, IXIA

    Since 2013, Donald has marketed Ixia’s solutions for the exciting and ever-evolving network security and enterprise IT industry. Our security team's goal is to enable enterprise's to build secure and optimized networks by leveraging proven methods of validating network and application designs through high-fidelity testing. Donald is a creative, strategic thinker with honed execution skills for complex lifecycle product management. His extremely diverse work experience provides a unique view into all elements of marketing including: hardware engineer, software engineer, FAE. Donald's areas of expertise include: market needs analysis and roadmap creation, lead cross-functional teams including partner program and ecosystem development, public speaking, and negotiation skills.

    John Kindervag
    Vice President, Principal Analyst serving Security & Risk Professionals at Forrester Research

    John is a 25-year veteran of the high-tech world. He holds numerous industry certifications, including CISSP, CEH, QSA, and CCNA. He has particular expertise in the areas of wireless security, intrusion detection and prevention, and voice over IP hacking. He has been interviewed and published in numerous magazines, including Hospitality Technology Magazine, SecurityFocus.com, and Techtarget.com. John has spoken at many security conferences and events, including ToorCon, ShmoCon, and InfoSec World. He has a Bachelor of Arts degree in communications from the University of Iowa.

    Ira Winkler
    President, Secure Mentem, CISSP

    Ira Winkler, CISSP, is President of Secure Mentem. He is considered one of the world’s most influential security professionals, and has been named a "Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically "broke into” some of the largest companies in the World and investigated crimes against them, telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assist organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, the 2013 CSO Compass Award, as well as several other prestigious industry awards. 

    Mr. Winkler began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. He moved on to support other US and overseas government military and intelligence agencies. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### ISSA International Conference - Home Page - Information Systems Security Association ISSA 2017 International Conference
    Contact Us   |   Print Page   |   Sign In   |   Register
    ISSA International Conference - Home Page

     

    Join us at the 2017 ISSA International Conference!

    Conference Theme | Schedule at a Glance | Registration | Venue | Hotel Reservations | Sponsors | Partners


    About the Conference Theme / #ISSAConf

    Join us October 9-11, 2017 at the Sheraton Hotel & Marina in San Diego, California for solution oriented, proactive and innovative sessions focused on the Digital Danger Zone

    Each day, cyber threats become increasingly intricate and difficult to detect. Over the past year, we saw that with the rise of device connectivity came boundless opportunities for malicious hackers to attack device vulnerabilities. No cyber security professional can become an expert on these digital dangers without continued efforts to educate themselves on the industry’s latest trends and technologies.

    We look forward to welcoming you and over 800 of your colleagues and peers in San Diego as we discuss topics ranging from incident response to application security to business skills for the information security professional. Join us at the 2017 ISSA International Conference and we’ll help you navigate the Digital Danger Zone.




    Detailed Schedule
    Click here for session descriptions

     

     Registration Is Open!

    Registration Rates July 15, 2017 - October 8, 2017

    • Members***:  Registration is $499 USD.
    • Non-Members:  Registration is $898 USD
    • Students: Full conference registration is $150 USD

    On Site Rates after October 8, 2017

    • Members***:  Registration is $549 USD.
    • Non-Members:  Registration is $998 USD
    • Students: Full conference registration is $150 USD

    Volunteer Rates

    Conference registration includes:

    • All sessions on October 10-11; including keynotes, breakout sessions, breakfast, and lunch both days.
    • October 9 Opening Reception and Capture the Flag.
    • October 10 Party on the Flight Deck at USS Midway.
    • A certificate of attendance for continuing professional education (CPE), up to 16 hours available.
    • Exclusive access to the ISSA International Conference mobile app for conference information and networking. The app launces in September, watch your email for details!

     ***To access the Member Rate, you must be a dues-paying member of ISSA International in good standing. On the registration website, you will prompted to search for your member record using your member email address.

    Group Discounts

    Staff can assist you with your group registration of 5 or more attendees. Please contact Leah Lewis for a group discount code. Group discounts are as follows:

    • 5 or more attendees: 10% off
    • 10 or more attendees: 20% off

    ISSA Conference Registration Cancellation Policy:

    Substitution, cancellation, and refund requests must be submitted in writing and faxed to + 703 435 4390 or emailed to conference@issa.org.

    • For cancellations received through September 15, 2017, you may receive a full refund minus a $50 administrative fee.
    • For cancellations received between September 16, 2017 through October 8, 2017, fifty percent (50%) of the registration fee will be refunded.
    • Cancellations received on or after October 9, 2017 are nonrefundable. No refunds will be granted for nonappearances.
    • Substitutions are permitted at any time upon written notice from the original registrant.
    • Confirmation of refund request is the responsibility of the attendee.
    • Refunds will be processed no later than October 31, 2017.

    Venue

    San Diego Sheraton Hotel & Marina
    1380 Harbor Island Dr.
    San Diego, CA 92101

    Click here to reserve your room at the San Diego Sheraton Hotel and MarinaThe daily rate is $199 plus state and local taxes. Reservations are available until September 15, 2017 or until the block sells out, whichever comes first. Space is limited.

    ONLY make your reservation using this link or by calling the hotel directly. Hotel piracy is a new epidemic in the meeting and events industry. Scam companies may reach out notifying you that ISSA has contracted outside vendors to assist you with booking your hotel reservation. These fake companies then pressure you or your office staff to provide them with your credit card information to book your hotel stay directly through them. If you fall for their trick, you may arrive to the meeting location and there will not be a reservation under your name, but your fees for the room would have been stolen from your credit card. If you are contacted in such a manner, please capture as much information as possible and send their contact information to us at mjamborsky@issa.org. Do not make any reservations with another organization, as we will be unable to assist you with any issues that may arise. Only use official ISSA materials to register for the meeting and book your hotel stay – never work with a third party, book directly through our website or email communication. We take the privacy of our members very seriously. ISSA will never release your contact information to a third party housing vendor. Also keep in mind, this situation could happen to other similar societies or organizations for any meeting, conference, or convention you might attend.


    Sponsor & Exhibitor Opportunities


    Contact Sean Bakke (sean.bakke@issa.org) for sponsorship options and exclusive branding opportunities.

    Thank You to ISSA's 2017 Conference Sponsors

    Blue Diamond Sponsor


    Diamond Sponsors

                        
          


    Platinum Sponsors
         






    Gold Sponsors
           
         
      


    Silver Sponsors

    >

     
      
            
      
     
          
     
       

    Exhibitors

     Image_result_for_fidelis_cyb.png  
     

     

    ISSA Education Foundation Annual Fundraiser Sponsors

       
               

    Media Partners



    Career Center Participants

                          
               

     

           



    2016 International Conference Recap

    Click here to access presentations from the 2016 conference



    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### April CISO Forum San Francisco 2015 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    April CISO Forum San Francisco 2015



    Theme: New Strategy and Technology Approaches for the CISO. Bring your CIO!
    Date: April 18-19, 2015
    Location: San Francisco, California

    Join us in San Francisco, California to discuss new and innovative technology updates relevant to CISOs representing companies from around the world. The event will feature a Venture Capitalist Panel where technology startups will share what they are funding in the future and determine what solutions are necessary for CISOs in the future of security. We encourage CISOs to bring their CIO to this meet to learn collaboratively about new strategy and technology approaches.


    Registration:
    ISSA CISO Executive Members: click here to register
    Guests: click here to apply (attendance is subject to approval)

     

    NEW Venue:
    The Argonaut Hotel
    495 Jefferson Street
    San Francisco, CA 94109

    If you are attending the RSA Conference after this forum, ISSA is providing a complimentary shuttle to the Moscone Center April 20-24, 2015. Click here for the shuttle schedule

     
    Transportation:
    New to Uber? Join here to earn up to $20 off your first ride!

    Agenda:

    April 18, 2015


    5:00 p.m. - 8:00 p.m.

    Cloud Security: Are You on the Train or on the Tracks?

    Brian Grayek

    Verizon

    April 19, 2015

     

    8:00 a.m. - 8:50 a.m.

    Registration and Breakfast

    8:50 a.m. - 9:00 a.m.

    Opening Comments and Welcome Address
    Kevin Rigney and Steve Tcherchian, Q2 2015 CISO Forum Co-chairs

    9:00 a.m. - 10:15 a.m.

    Current Threat to the U.S. from Cyber Espionage and Cyberterrorism
    Elvis M. Chan
    Supervisory Special Agent, FBI San Francisco

    >>biography

    10:15 a.m. - 10:45 a.m.

    Networking Break

    10:45 a.m. - 12:00 p.m.

    Venture Capitalist Panel, featuring:

    Moderator
    Pete Lindstrom: VP of Research, Spire Security, LLC

    Panelists

    Alex Doll: Founder, Managing General Partner, Ten Eleven Ventures
    Rick Gordon: Managing Partner, Mach37 Cyber Accelerator
    Rama Sekhar: Principal, Norwest Venture Partners

    12:00 p.m. - 1:15 p.m.

    Lunch

    1:15 p.m. - 2:15 p.m.

    Innovative Security for an Accelerating World

    John Stewart 

    Senior Vice President and Chief Security Officer, Cisco Systems

    >>biography

    2:15 p.m. - 2:45 p.m.

    Networking Break

    2:45 p.m. - 3:45 p.m.

    Rethinking Your Strategy for Brave New World of Security
    Brett Wahlin
    Vice President & Chief Information Security Officer, Hewlett-Packard

    >>biography

    3:45 p.m. - 4:15 p.m.

    Networking Break

    4:15 p.m. - 4:30 p.m.

    Sponsor Prize Drawing

    4:30 p.m. - 5:30 p.m.

    Afternoon Keynote

    David Estlick
    Information Security Chief, Starbucks
    >>biography

    5:30 p.m. - 6:30 p.m.

    Closing Reception

     

    This event is generously supported by:

            
       


    Questions? Please contact Leah Lewis: 1 866 349 5818 extension 4082.

    For sponsorship opportunities, please contact Joe Cavarretta: 1 866 349 5818 extension 4095.


    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### ISSA International Conference - Home Page - Information Systems Security Association ISSA 2017 International Conference
    Contact Us   |   Print Page   |   Sign In   |   Register
    ISSA International Conference - Home Page

     

    Join us at the 2017 ISSA International Conference!

    Conference Theme | Schedule at a Glance | Registration | Venue | Hotel Reservations | Sponsors | Partners


    About the Conference Theme / #ISSAConf

    Join us October 9-11, 2017 at the Sheraton Hotel & Marina in San Diego, California for solution oriented, proactive and innovative sessions focused on the Digital Danger Zone

    Each day, cyber threats become increasingly intricate and difficult to detect. Over the past year, we saw that with the rise of device connectivity came boundless opportunities for malicious hackers to attack device vulnerabilities. No cyber security professional can become an expert on these digital dangers without continued efforts to educate themselves on the industry’s latest trends and technologies.

    We look forward to welcoming you and over 800 of your colleagues and peers in San Diego as we discuss topics ranging from incident response to application security to business skills for the information security professional. Join us at the 2017 ISSA International Conference and we’ll help you navigate the Digital Danger Zone.




    Detailed Schedule
    Click here for session descriptions

     

     Registration Is Open!

    Registration Rates July 15, 2017 - October 8, 2017

    • Members***:  Registration is $499 USD.
    • Non-Members:  Registration is $898 USD
    • Students: Full conference registration is $150 USD

    On Site Rates after October 8, 2017

    • Members***:  Registration is $549 USD.
    • Non-Members:  Registration is $998 USD
    • Students: Full conference registration is $150 USD

    Volunteer Rates

    Conference registration includes:

    • All sessions on October 10-11; including keynotes, breakout sessions, breakfast, and lunch both days.
    • October 9 Opening Reception and Capture the Flag.
    • October 10 Party on the Flight Deck at USS Midway.
    • A certificate of attendance for continuing professional education (CPE), up to 16 hours available.
    • Exclusive access to the ISSA International Conference mobile app for conference information and networking. The app launces in September, watch your email for details!

     ***To access the Member Rate, you must be a dues-paying member of ISSA International in good standing. On the registration website, you will prompted to search for your member record using your member email address.

    Group Discounts

    Staff can assist you with your group registration of 5 or more attendees. Please contact Leah Lewis for a group discount code. Group discounts are as follows:

    • 5 or more attendees: 10% off
    • 10 or more attendees: 20% off

    ISSA Conference Registration Cancellation Policy:

    Substitution, cancellation, and refund requests must be submitted in writing and faxed to + 703 435 4390 or emailed to conference@issa.org.

    • For cancellations received through September 15, 2017, you may receive a full refund minus a $50 administrative fee.
    • For cancellations received between September 16, 2017 through October 8, 2017, fifty percent (50%) of the registration fee will be refunded.
    • Cancellations received on or after October 9, 2017 are nonrefundable. No refunds will be granted for nonappearances.
    • Substitutions are permitted at any time upon written notice from the original registrant.
    • Confirmation of refund request is the responsibility of the attendee.
    • Refunds will be processed no later than October 31, 2017.

    Venue

    San Diego Sheraton Hotel & Marina
    1380 Harbor Island Dr.
    San Diego, CA 92101

    Click here to reserve your room at the San Diego Sheraton Hotel and MarinaThe daily rate is $199 plus state and local taxes. Reservations are available until September 15, 2017 or until the block sells out, whichever comes first. Space is limited.

    ONLY make your reservation using this link or by calling the hotel directly. Hotel piracy is a new epidemic in the meeting and events industry. Scam companies may reach out notifying you that ISSA has contracted outside vendors to assist you with booking your hotel reservation. These fake companies then pressure you or your office staff to provide them with your credit card information to book your hotel stay directly through them. If you fall for their trick, you may arrive to the meeting location and there will not be a reservation under your name, but your fees for the room would have been stolen from your credit card. If you are contacted in such a manner, please capture as much information as possible and send their contact information to us at mjamborsky@issa.org. Do not make any reservations with another organization, as we will be unable to assist you with any issues that may arise. Only use official ISSA materials to register for the meeting and book your hotel stay – never work with a third party, book directly through our website or email communication. We take the privacy of our members very seriously. ISSA will never release your contact information to a third party housing vendor. Also keep in mind, this situation could happen to other similar societies or organizations for any meeting, conference, or convention you might attend.


    Sponsor & Exhibitor Opportunities


    Contact Sean Bakke (sean.bakke@issa.org) for sponsorship options and exclusive branding opportunities.

    Thank You to ISSA's 2017 Conference Sponsors

    Blue Diamond Sponsor


    Diamond Sponsors

                        
          


    Platinum Sponsors
         






    Gold Sponsors
           
         
      


    Silver Sponsors

    >

     
      
            
      
     
          
     
       

    Exhibitors

     Image_result_for_fidelis_cyb.png  
     

     

    ISSA Education Foundation Annual Fundraiser Sponsors

       
               

    Media Partners



    Career Center Participants

                          
               

     

           



    2016 International Conference Recap

    Click here to access presentations from the 2016 conference



    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### February 2019 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference February 2019
    Contact Us   |   Print Page   |   Sign In   |   Register
    February 2019 ISSA Web Conference




    ISSA Thought Leadership Series: Adopting Zero Trust as an Enterprise Security Model

    Recorded (1 Hour Event) on Wednesday, February 13, 2019

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are relevant.

    The live, online panel discussion will explore:

    Key business imperatives that are changing the way you need to think about security
    What a Zero Trust security model is and why you need it
    Difference approaches to Zero Trust Security
    Zero Trust adoption best practices


     

    Moderator:

    Tyler Cohen Wood, Executive Director, Cyber Risk and Workforce Development, CyberVista

    Tyler Cohen Wood is a cyber-authority with 20 years of highly technical experience, 13 of which were spent working for the Department of Defense (DoD). As a keynote speaker, author, blogger, national security expert, and overall cyber expert, she is relied on to provide unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring industries have the tools they need to defend themselves in the digital world. Tyler sits on several cyber advisory boards, including CyberSat and The Internet of Things Consortium.

     

    Before becoming a private consultant, Tyler worked in the public sector as an Executive Director for CyberVista and as a Director of Cyber Risk Management group at AT&T using thought leadership and her cybersecurity expertise to develop new and inventive solutions to protect customers from hackers and the ever-increasing cyber threat landscape.



    Speakers:

    Felice Flake, CEO, ScySec LLC

    Felice Flake, CEO of ScySec LLC, is a highly sought after and proven leader in the security field. Felice has extensive experience in both the government and private sectors. She is the President of the Tampa Bay ISSA Chapter, and the Chairperson of the International Chapters Sub-Committee, ISSA International, Chairperson. She also serves as the Chairperson of the Scholarships & Awards Committee, Women in Defense-Central Florida Chapter, and the Peerlyst Tampa Ambassador. Some of Felice’s most recent speaking engagements include the Tampa Small Business Symposium, Tampa (ISC)2 B-Sides event, and the 2018 Women in Cybersecurity Conference (WiCyS) Conference in Chicago. She is a contributing author to the 2016 book, Women in Security. Felice is a member of the National CyberWatch Center's Curriculum Standards Panel (NCC-CSP) for the Cybersecurity Foundation Series. Felice is also an invited member of the University of South Florida Cybersecurity Education Advisory Board, the Tampa Military Spouse Economic Empowerment Zone (MSEEZ) Working Group, and the University of South Florida Cybersecurity for Executives Advisory Committee. She is also a nominee for the “2018 Tampa Bay Business Woman of the Year” Award and serves on the leadership team for the 2018 Diana Initiative Conference co-located with DEFCON.

     

    Felice holds a Bachelor’s degree in Criminal Justice with a focus on Homeland Security, a Master of Science in Cybersecurity, and is close to completing her Master of Business Administration focusing on Information Security Management.



    Patrick Sullivan, Global Director, Security Strategy, Akamai Technologies

    Patrick is the Global Director of Security Strategy for Akamai Technologies. In his 12 years at Akamai, Patrick has held a number of leadership positions including leading the Enterprise Security Architect team. Patrick and his team work with customers when they come under attack and designs security architectures to protect them from threats. In the course of helping to fend off so many attacks, he has gained unique visibility into attacks targeting many of the top Enterprises. Patrick holds a variety of security certifications including CISSP, GSLC, GCIH, and GWAPT. Patrick holds an Electrical Engineering degree from Virginia Tech and holds a graduate degree from George Mason University and a Graduate Certificate from Stanford University.

     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### March 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference January 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    March 2018 ISSA Web Conference




    ISSA Thought Leadership Series:Security Awareness Strategies

    Recorded (1 Hour Event) on Wednesday, March 21, 2018

    Click here to view the recording.
    Click here for the presentation.

    Click here to take the CPE quiz.


    Overview:

                                               Beating Hackers at Their Own Game: Security Awareness Strategies That Work

    If 2017’s explosion of cybersecurity breaches taught us anything, it’s that our workforces, more than ever, are one of our most critical defenses. But with as much as 30% of employees unable to spot a phishing email, how do you keep hackers from hijacking your data? The seemingly obvious answer is security awareness training. Unfortunately, many security education programs today fail to sufficiently change employees’ security attitudes, skills and behaviors -- providing a false sense of protection and safety. Even worse, 48% of companies do not have an employee security education program.

    If your New Year’s infosec resolutions include launching a security awareness initiative, or reviving an existing one, what better way to guarantee results than to learn from pros who have been in your shoes. Join our expert panel as they share:

    ● Their most effective security awareness strategies to improve your organization’s security posture

    ● Proven methods to get employees to take security seriously (before a breach occurs)

    ● Security awareness program pitfalls to avoid and biggest lessons learned

    ● Predictions on what will cyber attacks will look like in the next couple years and what you should do in your security awareness program today to prepare
     

    Moderator:

    Robb Reck, Ping Identity

     

    As Chief Information Security Officer at Ping Identity,  Robb is responsible for ensuring the integrity of all products Ping creates, the confidentiality of sensitive data, and the availability of critical services. Robb serves on the CISO Advisory Council for ISSA International, and previously served as president for the Denver chapter. Previous to his role at Ping, Robb served as vice president and CISO for Pulte Financial Services. Before Pulte Robb served as Information Security Officer and Director of Risk Management for Harland Financial Solutions. Robb holds a Bachelor’s of Arts from George Fox University and an MBA from Colorado State University.

     

    Speakers:

    Jack Koziol, InfoSec Institute

    Jack Koziol is President & Founder of InfoSec Institute, a leading security awareness and anti-phishing training provider. With years of private vulnerability and exploitation development experience, he has trained members of the U.S. intelligence community, military and federal law agencies. His extensive experience also includes delivering security awareness and training for Fortune 500 companies including Microsoft, HP and Citibank. Jack is the lead author of The Shellcoder's Handbook: Discovering and Exploiting Security Holes. He also wrote Intrusion Detection with Snort, a best-selling security resource with top reviews from Linux Journal, Slashdot and Information Security Magazine. Jack has appeared in USA Today, CNN, MSNBC, First Business and other media outlets for his expert opinions on information security.



     

    Marnie Wilking, Orion Health

    Marnie Wilking has directed Information Security and Operational Risk Programs for more than 15 years, providing a unique set of skills and experience to manage operational risks and improve risk management among diverse businesses. She is currently Chief Information Security Officer for Orion Health, a global provider of healthcare information technology. She has held multiple Information Security and Risk Management positions with Early Warning in Scottsdale, AZ, and Wells Fargo, including technical project and program management; technology consulting; and oversight of Information Security, Third Party Risk Management, Business Continuity, and Records Management programs. She began her career with Accenture, providing project and program management services to global Financial Services clients. Ms. Wilking holds the CISSP, CISA, and CISM designations, and is a member of the Phoenix chapters of ISSA and ISACA, as well as the CISO Advisory Council for the ISSA CISO Executive Forum. She holds an MBA in Technology Management from University of Phoenix, and a Bachelor of Arts in Mathematics and Statistics from Miami University (Ohio).

     

    Michael Towers, Allergan

    Mike is accountable globally for protecting the confidentiality, integrity and availability of Allergan’s vast information assets across an R&D, supply chain and commercial enterprise spanning ~100 countries. This includes strategy, governance, risk management, 3rd -party oversight, IT compliance, identity & access management, security technology management, security analytics and monitoring, incident response, investigations and forensics, and SAP/ERP security.
    Mike passionately champions industry collaboration and information sharing within multiple executive security forums, including Department of Homeland Security’s National Health ISAC, where he is currently serving on the Board of Directors and is Chair of the Product and Services Committee. Mike is also an active member of McKinsey’s Healthcare CISO Group, Corporate Executive Program (CEP), and Corporate Executive Board’s Information Risk Leadership Council. Specific to the cybersecurity space, Mike serves as an executive advisor to many leading technology and service providers, including Okta, Exabeam, and Palo Alto Networks.
    Mike was recently named the 2015 Information Security Executive of the Year for the Northeast by T.E.N., as well as the 2015 Information Security North America Executive of the Year for the Healthcare sector.
    Previously, Mike was VP, Information Security Assurance at GlaxoSmithKline (GSK). There, Mike was accountable for the security of GSK’s information systems and computing infrastructure spanning 400+ sites in 110 countries, owning shared services in the areas of platform, network, application, and data security and advanced threat defense.
    Mike is CISSP, Lean Sigma Coach/Practitioner, Six Sigma Green-Belt, and ITILv3 certified. 


    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### November CISO Forum Dallas 2016 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    November CISO Forum Dallas 2016

    ISSA_CISO_FORUM_Web_Banner_D.jpg

    Theme: Big!
    Date: November 3-4, 2016
    Location: Dallas, Texas

    IPSEC: With ipsec ipv4, there are enough IP addresses to provide 1 IP address for 60% of the people on earth.
    With ipsec ipv6, there 670 quadrillion IP addresses per square millimetre of the earth's surface, or 100 IP addresses for every atom on earth.
    IoT: Only 10 billion things that could be connected to the internet currently are, out of 1.5 trillion things. Gartner says there will be 26 billion connected devices by 2020. Cisco says there will be 50 billion, Intel says 200 billion, and the IDC says 212 billion.
    Malwarebytes Labs predicts that this year, we'll see the first major attack on Internet of Things devices.
    Big Data: Every 2 days, we create as much information as we did from the beginning of time to 2003.
    Over 90% of all the data in the world was created in the past 2 years.By 2020, the amount of digital information in existence will have grown from 3.2 zettabytes now to 40 zettabytes, or 44 trillion gigabytes. and what is a Hadoop anyway!
    Global Privacy and Security Laws: Global Privacy and Security Law, "the newest, fully comprehensive, and completely current resource on the complex topic of foreign data-protection laws", provides 58 clear and concise country reports, averaging about 25 pages each, or almost 1500 pages to help you keep up with laws in Europe the Americas, Africa, the Middle East, and Asia Pacific. This document is refreshed 3 times annually.

    Come hear what security experts in the industry and among your peers have to say about security in this Big New Reality.

    Registration:

    Type Fees and Benefits Registration Link
    ISSA CISO Executive Members

    Complimentary meeting registration and one complimentary night of hotel accommodations*

    click here to register

    learn about CISO Executive Membership here
    First Time Guests Complimentary meeting registration click here to apply
    (attendance is subject to approval)
    Returning Guests $400 click here to apply**
    (attendance is subject to approval)

     *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

    **Upon verification of eligibility, guest will be invoiced for the $400 registration fee

    Venue:
    Hyatt Regency Dallas
    Union Station: Frisco A
    300 Reunion Blvd
    Dallas, TX 75207


    Transportation:

    New to Uber? Join here to earn up to $15 off your first ride!

    Agenda:

    November 3, 2016


     5:30 p.m. - 7:00 p.m.  ISSA International Conference Closing Reception
    CISO Forum attendees are invited to attend the Closing Reception of the ISSA International Conference for drinks and hors d'oeuvres before the Opening Dinner. 
     7:00 p.m. - 7:30 p.m. Registration

    7:30 p.m. - 9:00 p.m.

    Dinner Keynote: Security is Big! In fact, it’s Huge! Can you meet the challenge?
    Eric Cowperthwaite: Managing Principal, Citadel Services. Click here for slides.


    November 4, 2016

     

    8:00 a.m. - 8:45 a.m.

    Registration and Breakfast

    8:45 a.m. - 9:15 a.m.

    Opening Comments and Welcome Address

    9:15 a.m. - 10:15 a.m.

    Opening Keynote: Big Opportunities, Big Risks, and an even Bigger Leadership Challenge for CISO’s to inspire their teams to navigate both in order to protect to enable people, data, and business
    Malcolm Harkins: Global Chief Information Security Officer
    Cylance Inc. Click here for slides.

    10:15 a.m. - 10:45 a.m.

    Networking Break

    10:45 a.m. - 11:45 a.m.

    Alignment is Key: Big Data & Cloud from a Business Centric Perspective
    Dr. Chris Pierson: EVP, Chief Security Officer and General Counsel
    Viewpost. Click here for slides.

    11:45 a.m. - 1:00 p.m.

    Lunch

    1:00 p.m. - 2:00 p.m.

    Afternoon Roundtable Discussion

    2:00 p.m. - 2:30 p.m.

    Networking Break

    2:30 p.m. - 3:30 p.m.

    Rx For Managing Your Info/Cyber Security Workforce in the Epidemic of Big, More Complex, Faster Moving 
    David Foote: Co-Founder, Chief Analyst and Chief Research Officer, Foote Partners LLC. Click here for slides.

    3:30 p.m. - 3:45 p.m.

    Networking Break

    3:45 p.m. - 4:00 p.m.

    Sponsor Prize Drawing

    4:00 p.m. - 5:00 p.m.

    Closing Keynote Speaker

    Thomas Farmer: Assistant Vice President - Security, Association of American Railroads

    5:00 p.m. - 6:00 p.m.

    Closing Reception

      

    This CISO Executive Forum Is Sponsored by:

                   Blue_Coat_rgb_blk_V_Xlrg-R.jpg               DT_logo_onwhite_noBG.PNG 
    illumio_logo_mark_color_fina.jpg          Phantom_Logo_RGB.png       Proofpoint-logo-2016-K.jpg   

    RiskSense_Logo_Color.png         


    Questions?
     Please contact
     Leah Lewis: 1 866 349 5818 extension 4082.

    For sponsorship opportunities, please contact Joe Cavarretta: 1 866 349 5818 extension 4095.

     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### November 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference November 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    November 2018 ISSA Web Conference




    ISSA Thought Leadership Series: Micro-Segmentation 101

    Recorded (1 Hour Event) on Wednesday, November 14, 2018

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.


    YOU'LL LEARN...

    Why you need micro-segmentation
    How micro-segmentation works
    The 5 steps to implementing a micro-segmentation strategy for your data center and cloud


     

    Moderator:

    David Vaughn, ISSA International Board of Directors Chairperson for Education & Professional Development

    David Vaughn is a decorated military combat veteran. He is an accomplished Information Security Professional with over 20 years of Information Security experience. He maintains a broad range of experience from Enterprise Mobility, to Network Security Infrastructure design and testing. He has managed personnel, provided technical oversight for incident response and countermeasures, performed individual and team-based network assessments, information security R&D consulting, and computer forensics. David has a proven track record demonstrating the ability to effectively understand and communicate contextual business requirements to both technical and non-technical groups at any level of leadership to help customers achieve compliance within various regulatory bodies




    Speakers:

    Vijay Chauhan, Senior Director of Product Marketing, Illumio

    Vijay Chauhan is Senior Director of Product Marketing at Illumio, where he leads Product Launches and Content. Prior to Illumio, Vijay spent 4+ years at Splunk running Product Management and Strategic Alliances for Splunk’s Security business. Vijay started his career as a Security Practitioner in Financial Services, spending 7+ years at Barclays Bank, handling core information security functions including Security Operations, Risk, Security Engineering, Application Security, and Identity & Access Management. Vijay has a BS in Computer Science from Cambridge, MA in Sanskrit from UPenn, and MS in Computer Science from Stanford.

     

    Branden Williams, Director, Cyber Security, MUFG Union Bank N.A.

    Dr. Branden R. Williams has more than twenty years of experience in business, technology, and information security as a consultant, leader, and an executive. His specialty is navigating complex landscapes—be it compliance, security, technology, or business—and finding innovative solutions that propel companies forward while reducing risk.


    John Donovan, ISSA Silicon Valley Chapter & Rook Security

    John is past-president and a board director of the Silicon Valley ISSA Chapter (https://sv-issa.org/). He’s a member of the CaC (CISO Advisory Council) for the ISSA’s CISO Executive Forum and participant in a number of security events including past CISO Executive Forums, ISSA International and regional conferences such as the Cornerstones of Trust conference (https://cornerstonesoftrust.com/) in the San Francisco Bay Area. John is a passionate supporter of both the local arts community and cyber-security community in the Silicon Valley and beyond. In his day job, John builds and runs security programs and is currently CISO for an early-stage security technology startup. Past professional positions include developing and managing Security, Risk, IT, and engineering programs for Illumio, Veracode, NetApp, Xilinx, and other technology and security companies .

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Women In Security Webinar July 2016 - Information Systems Security Association Women In Security SIG July Webinar
    Contact Us   |   Print Page   |   Sign In   |   Register
    Women In Security Webinar July 2016
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### June CISO Forum Boston, MA 2019 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    June CISO Forum Boston, MA 2019


    Theme  |  Registration  |  Hotel Reservations & Transportation  |  Agenda  |  Sponsors


     

    No Rest for the Weary: The Continued Convergence of Privacy and Security
    Date: June 13-14, 2019
    Location: Boston, MA

    This June we provide you an opportunity to learn from industry experts and explore the ever-changing and dynamic world at the intersection of Privacy and Security! The ISSA Executive Forum series is proud to be partnering with the International Association of Privacy Professionals (IAPP), the world’s largest privacy organization with nearly 50,000 members worldwide. With Europe’s landmark GDPR legislation less than a year old, newly proposed legislation from several US states (most prominently California) promises to make 2019 an even more crucial year for obtaining a greater understanding of the privacy landscape. Together, ISSA and IAPP are working to exchange knowledge and experiences in order for all to make sense of these changes -- adding a deeper knowledge to each other’s skill-set is now no longer a “nice to have” — it is essential! 

    This is an event focused on benefiting our Executive members and qualified guests. The ISSA Executive Forum is your chance to escape from the blizzard of buzzwords to meet up with your peers, industry experts, and specially selected security vendors in a relaxed and confidential environment. In this session, we will discuss real privacy and security programs, share real-world scenarios, and learn from each other. 

    Finally, attendees at the June 2019 event will have a chance to help shape the content and format for future meetings of the ISSA Executive Forum in 2019 and beyond. 

    We look forward to seeing you at this year's event in Boston!

    Warm Regards,

    Marc Thompson

    ISSA Executive Director

     

    Registration:

    Type Fees and Benefits Registration Link
    ISSA CISO Executive Members

    Complimentary meeting registration and one complimentary night of hotel accommodations*

    click here to register

    learn about CISO Executive Membership here
    First Time Guests Complimentary meeting registration click here to apply
    (attendance is subject to approval)
    Returning Guests $400 click here to apply**
    (attendance is subject to approval)

    *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

    **Upon verification of eligibility, guest will be invoiced for the $400 registration fee

     

    Hotel:

    Venue:
    Hilton Boston/Woburn
    2 Forbes Rd.
    Woburn, MA 01801

    Click here to reserve your room at the Hilton Boston/Woburn. The daily rate is $169 plus resort fee and state and local taxes. Reservations are available until May 5, 2019 or until the block sells out, whichever comes first. Space is limited.

    Transportation:
    New to Uber? Join here to earn up to $15 off your first ride!

     

    Agenda:

    June 13, 2019


    5:00 p.m. - 8:00 p.m.

    Opening Dinner
    Presentation: TBD

    June 14, 2019

     

    8:00 a.m. - 8:50 a.m.

    Registration and Breakfast

    8:50 a.m. - 9:15 a.m.

    Opening Comments and Welcome Address

    9:15 a.m. - 10:15 a.m.

    Presentation: TBD
    J. Trevor Hughes, CIPP/US,  President & CEO, International Association of Privacy Professionals (IAPP)

    10:15 a.m. - 10:45 a.m.

    Networking Break

    10:45 a.m. - 11:45 p.m.

    Presentation: TBD

    Name: 

    11:45 a.m. - 12:00 p.m. Wisegate

    12:00 p.m. - 1:00 p.m.

    Lunch

    1:00 p.m. - 2:30 p.m.

    Security & Privacy Panel
    Moderated by: Omer Tene, Vice President & Chief Knowledge Officer, International Association of Privacy Professionals (IAPP)

    Panelists:

    Web Hull, Lead Information Security Privacy Specialist, Houghton Mifflin Harcourt
    Dana Simberkoff, Chief Risk, Privacy and Information Security Officer, AvePoint
    Heather Sussman, Global Co-chair, Cyber, Privacy & Data Innovation advisory practice and Leader, Orrick, Herrington & Sutcliffe LLPTBD

    2:30 p.m. - 3:30 p.m. Presentation: TBD
    Omer Tene, Vice President & Chief Knowledge Officer, International Association of Privacy Professionals (IAPP)

    3:30 p.m. - 4:00 p.m.

    Networking Break

    4:00 p.m. - 5:00 p.m.

    Presentation: TBD 
    Name:
     

    5:00 p.m. - 5:15 p.m.

    Sponsor Prize Drawing

    5:15 p.m. - 6:15 p.m.

    Closing Reception


    Questions? Please contact
     Member Services: +1 (703) 382-8205 (local/international)

     

    Sponsors:

    For sponsorship opportunities, please contact the ISSA Sponsorship Team at sponsor@issa.org





          

       
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### June 2017 ISSA International Web Conference - Information Systems Security Association ISSA June 2017 Web Conference
    Contact Us   |   Print Page   |   Sign In   |   Register
    June 2017 ISSA International Web Conference




     

     

    Building Security in a Business Culture

    Recorded Live: Tuesday, June 27th, 2017 

    Click here to access the recording
    Click here to take the CPE quiz.
    Click here for a copy of the slides


    Generously Sponsored By



    Overview:

    Everyone knows security is critical to our organizations survival, but yet we all seem to bolt on our security culture after the fact. This session will provide insight into why and how you can build your security culture and leverage the role of change management & behavioral change in making security programs more effective. Culture is an outcome of values, behaviors and communications.

    Many of us are faced with cultures and management structures that seem hostile to a successful security program. We're going to talk about how to identify those cultures that make it difficult to be successful and how to make a decision about what you should do: fish or cut bait. Can you make a difference or is it time to move on?


    Moderator:

    Mark Kadrich

    For the past 25 years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. Mr. Kadrich serves as CISO at Antelope Valley Hospital. He holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering.



    Speakers:

    Karen Worstell - Managing Principal, W Risk Group

    Karen Worstell's executive experience in information security and IT risk management spans 25 years and multiple industries. She served as Program Manager of Information Security Research in the Boeing Company's Research and Technology division, CEO of Atomic Tangerine (a spinoff of SRI Consulting), SVP of security and business continuity for Bank of America, VP IT Risk Management and CISO for AT&T Wireless, CISO of Microsoft, and Director of Information Security for Russell Investments.


    Jeff Schilling - Chief Security Officer, Armor

    Jeff Schilling (COL USA RET) is Armor’s Chief of Security and is responsible for the cyber and physical security programs for the corporate environment and customer hosted capabilities

    Danielle Kingsbury - Founder, CyberSecPsych

    Danielle Kingsbury is president and founder of CyberSecPsych, where she focuses on the cognitive and behavioral psychological mechanisms that create strong security cultures within organizations. Her goals are to improve security awareness in the workplace and among children through applying principles learned from her past experience as a practicing psychologist. She is also working to make the cybersecurity industry more attractive to Women and Millennials and closing the employment gap. She holds an M.A. in Clinical Psychology and has worked in a variety of settings, including schools and non-profits. She can be contacted through her website at http://www.cybersecpsych.com

     

    Click here to register

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### October 2015 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    October 2015



    Big Data--Trust and Reputation, Privacy--
    Cyber Threat Intelligence

    Recorded Tuesday, October 27, 2015
    Click here to listen to the recorded event.
    Click here to view the slide deck.
    Click here to take the CPE Quiz.


    Overview:
    The internet is forever. If something is posted on the net, there is no way to get it back – or even correct it. This webinar will talk about the potential uses of big data ‘for good’ and ‘bad’.


    Moderator:
    Hari Pendyala
    ISSA Fellow and Member, Chennai, Asia Pacific Chapter
    ISSA Web Conference Committee 

    Hari M. Pendyala is an ISSA Fellow and has been member of ISSA since 2004. He is currently working as Director and Chief Advisor for Zraddhaa Information Services Pvt. Ltd.; which provides Information Security Services in US, India, Singapore, Malaysia, Thailand, Philippines, Indonesia and South Korea.

    He has 19+ years of experience in Information Technology with 14+ years of detailed work in the field of Information Security. He is a CISSP, CISM and ITIL v3 certified professional.

    Hari is currently serving as President, Tirupati Information Technology Association and working towards ISSA Bangalore Chapter formation. Hari has served as board member for Silicon Valley ISSA, holding various roles from 2004 till 2009. He thoroughly enjoys teaching and mentoring K-8 kids about Robotics and other science topics. He is also an avid proponent of Green Energy, specifically Solar.

    Hari has Master’s in Computer Engineering from Florida Atlantic University, Florida and Bachelor's in Electrical and Electronics Engineering from S.V. University, Tirupati, India.


    Speakers:

    Ian Amit
    Vice President, ZeroFox

    Ian Amit, Vice President at ZeroFox, has over a decade of experience in hands-on and strategic roles, working across a diversity of security fields: business, industry, marketing, technical and research. At ZeroFOX, Ian leads the company’s strategy, customer solutions offerings, and runs ZeroFOX’s New York offices. Previously, Ian served as Director of Services at IOActive. His career also includes time at Security-Art, Aladdin, Finjan, and Datavantage, as well as speaking at conferences such as BlackHat, DefCon, and InfoSecurity. A skilled researcher, Ian has deep technical knowledge of programming, operating systems (particularly Unix and Win32), applications (including most network server applications), penetration testing, databases and infrastructures. He founded the Tel-Aviv DefCon chapter (DC9723) and also was a founding member of the Penetration Testing Execution Standard (PTES). Ian studied Computer Science and Business Administration at the Herzliya Interdisciplinary Center and lives in Manhattan.

     

    JC Cannon
    Founder, Assertive Privacy

    JC is the founder of Assertive Privacy, a Washington D.C. based consulting agency. He assists startups with privacy reviews, provides input to policy discussions, is an instructor for IAPP's certification program and speaker at privacy events. Cannon continues to be a staunch privacy advocate fighting for the Privacy Bill of Rights.

    Cannon recently retired from a sixteen-year career at Microsoft where he spent twelve of those years focused on privacy. At Microsoft he performed privacy reviews of dozens of new products, services and websites. He monitored external privacy activities from regulators, researchers, industry and competitors, kept senior executives abreast of business-impacting privacy activities and developed action plans for product, policy and marketing teams to follow. He assisted with the creation of numerous privacy policies, standards, training and resolution to regulatory inquiries.

    While at Microsoft, Cannon developed the compliance program for Microsoft’s SQL Server database product, which included white papers, an SDK, client surveys and a hands-on lab. The program enabled organizations to programmatically manage access to personal data and validate compliance based on policy. Cannon spent four years in Microsoft’s Corporate Privacy Group during its formative years leading the creation of the first privacy standard for developers, privacy training, privacy council and product reviews for developers. He worked on Microsoft’s Identity Management team where he developed a program that helped developers integrate the technology into their applications providing for centralized identity and profile management.

    Cannon is a member of the IAPP Publication Advisory Board, past VP of the University of Washington World Series Board and participates in numerous privacy events. He is the author of Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals, Privacy: What Developers and IT Professionals Should Know and contributed to the books Writing Secure Code and Windows Security Resource Kit. He is the author of The Euclidian science fiction books.

     

    Jude Patrick
    Vice President Alliances, Venusgeo Solutions 

    Senior Management Executive with Business, Technology and Operations Expertise in achieving revenue, profits and business growth goals. Mastered the art of business transformation by consulting led approach, identifying critical shareholder value, boost innovations with ideas and leverage on co creation to harness opportunity on the emerging business trends. Highly successful in building relationships with top-level decision makers, take control of critical problem areas, and delivering on customer commitments. Customer-focused and performance-driven. Worked across industry verticals Telecom, Airlines, Retail, Manufacturing in the last 18 years, in India, US and UK.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### April 2016 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    April 2016




    The Sky is Falling... CVE-2016-9999(nth)?


    2-Hour live event Tuesday, April 26, 2016

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Click here to view the recording.
    Click here to take the CPE quiz.
    Click here to view the slides.

    Overview:

    We have all heard about the US National Vulnerability Database. This database appears to be a great, if not depressing, tool. Since its creation there have been 76,000 CVEs posted. In just the last year there were 7,029 posted; and so far this year there have been more than 1,700 CVEs published. This raises the question, when will it stop? What can we do to stop it? Are there any strategies we might employ or things we could do to mitigate the impact of the vulnerabilities?

    Moderator:

    Matthew Mosley

    Director of Product Management, Symantec; NOVA Chapter, ISSA Web Conference Committee

    Matt Mosley has been working as a security professional for more than 20 years in roles within corporate IT and risk management, strategic consulting, and product development. In his current role with Symantec, Matt is responsible for product strategy for managed security services. Prior to this role, Matt held senior leadership roles with leading security firms including NetIQ, Internet Security Systems, Intellitactics and Brabeion Software. Matt holds the CISSP, CISM, and CISA designations, teaches CISSP courses for ISSA-NOVA, and is a frequent speaker at security conferences.


    Speakers:

    Joshua Corman

    Joshua Corman is a Founder of I am The Cavalry (dot org) and Director of the Cyber Statecraft Initiative for the Atlantic Council. Corman previously served as CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research & strategy roles for The 451 Group and IBM Internet Security Systems. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure.

    Josh's unique approach to security in the context of human factors, adversary motivations and social impact has helped position him as one of the most trusted names in security. He also serving as an adjunct faculty for Carnegie Mellon’s Heinz College and on the 2016 HHS Cybersecurity Task Force.


    Jon Miller

    Jon Miller is the Chief Resource Officer for Cylance, a maker of next-generation anti-virus software and provider of breach incident response and other professional services. He leads Cylance through insight and direction around technology, partnerships, research and market opportunities. He was previously a vice president with Accuvant, where he built and led threat research and customer engagement services. Prior to that he spent five years on the X-Force professional services team of Internet Security Systems.

    Miller is a well-known hacking expert who gave his first public talk at DEF CON at age 20. Jon started his career in information security in his early teen years, focused on studying Internet technology, running Linux servers and consulting for small businesses. He came to see computer hacking as nothing more than knowing a system well enough to subvert controls by figuring out alternate paths. He became hooked on studying hacking after attending his first DEF CON in Las Vegas at the age of 16 and spoke at the conference for the first time four years later. By then, he was focused on working as an information security professional, performing penetration tests and security assessments for small businesses just starting to establish their Internet presence.

    In 2003, at age 21, Jon joined the X-Force professional services team at Internet Security Systems, a pioneer in penetration testing and incident response. In 2007 he joined Accuvant, then a small regional value-added reseller. He built and ran Accuvant Labs, which provided high-quality technical consulting, including vulnerability researchers and penetration testing. By 2012 Accuvant Labs employed more than 100 consultants and researchers delivering services to Fortune 1000 companies and government intelligence agencies. The unit’s groundbreaking research spawned dozens of industry talks. In 2014, Jon joined Cylance to work with two of his longtime role models, Stuart McClure, and Ryan Permeh, in their quest to create a new security product capable of identifying and blocking increasingly pernicious breeds of malicious software.

    Jon has delivered dozens of public talks at security and technology conferences including Black Hat , DEF CON, IEEE and ToorCon. He has been featured in publications including Forbes, Huffington Post and Rolling Stone. He has appeared on “60 Minutes” and Fox News.

    Jon serves on advisory boards to Built Games, DirectDefense and IronSkye.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### July 2017 ISSA Web Conference - Information Systems Security Association July 2017 ISSA International Web Conference
    Contact Us   |   Print Page   |   Sign In   |   Register
    July 2017 ISSA Web Conference




    Here Come the Regulators

    Recorded Live: Tuesday, July 25th, 2017

    Click here to access the recording.
    Click here for a copy of the slides.
    Click here to take the post conference quiz for CPE credits.



    Generously sponsored by



    Skybox Security



    Overview:

    As the face of the world changes once again and governmental sanctions loom on the horizon, what happens with global data protection levels when one country decides to allow or disallow technology to cross its borders?

    For example, how will Brexit impact the global technology rules? Looking ahead to next year, how much of an impact will the sweeping new requirements of the EU General Data Protection Regulation (EU GDPR) have on the rest of the world? We bring in regulatory experts to take on this increasingly daunting and international issue.


    Moderator:

    Michael Angelo Chief Security Architect - Micro Focus

    Speakers:

    Grant Johnson - Principal Consultant - Array Information Technologies
    With a specialization in information systems security, Grant Johnson is the principal consultant of Array Information Technologies. His IT career began with a Bachelor of Arts degree in Telecommunications from Michigan State University. Over the past 30 years he has designed, engineered, project managed, and served as the virtual manager of complex voice and data systems and networks in the pharmaceutical, defense, government, education, and healthcare vertical markets. Knowing the importance of on-going education and training in an evolving and challenging industry, Grant maintains CISSP (ISC2), CISM (ISACA), and Security+ and Network+ (CompTIA) certifications. Grant serves in leadership roles in numerous security industry organizations including the ISSA Healthcare SIG and the Michigan Chapter of InfraGard.

    Simon Russell - Managing Partner, BeCyberSure
    Simon opened the US operations in January 2015 and has overseen the drive focusing on small and medium sized firms which he observed were being poorly catered to. In addition to the traditional consulting services Simon developed and implemented the subscription based outsourced CISO service for SME’s. Under his leadership the North American operations have built a client base covering multiple sectors from financial services, insurance and law firms to manufacturing. Simon regularly speaks at conferences and round table events and is a passionate advocate for better cyber hygiene and awareness. Simon started his career in Financial services in 1993 and spent 21 years in equities and derivatives in both sales and trading capacities for institutions including Deutsche Bank, Bank Austria and Rabobank. He has lived and worked in multiple European countries as well as several extended stints in Asia before moving to New York in 2006. Simon holds a BA (Hons) in Economics from Kingston University.

    Kevin Flynn - Director of Worldwide Product Marketing - Skybox
    Kevin Flynn is Director of Worldwide Product Marketing at Skybox Security. Prior to joining Skybox Security in August 2016, Kevin was Director of Product Marketing at Blue Coat Systems. He has over 25 years of experience in high tech and has been involved in cyber security technologies for over 15 of those years. His high tech experience started at Apple Computer where he was a product manager in Apple’s Advanced Technology Group. Kevin then spent over a dozen years at Cisco as a product manager and marketing manager in their security technology organization. After leaving Cisco, Kevin moved over to Fortinet for three years before joining Blue Coat in 2013. He is a frequent speaker on cyber security topics at conferences worldwide and has authored numerous articles on cyber security issues.

    Ronald Chichester - JD, CFE, CISA - Ronald Chichester, P.C.
    Ronald Chichester is an attorney, expert witness, certified computer forensic examiner, and certified information systems auditor who practices in Texas. Ron was also an adjunct professor of law for fourteen years, and chaired both the Business Law Section and the Computer & Technology Sections of the Texas Bar. He holds a bachelors and a masters degree in aerospace engineering from the University of Michigan, and a Juris Doctorate from the University of Houston.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### April 28, 2015 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    April 28, 2015

     

    Open Software and Trust--Better Than Free?

    Recorded Tuesday, April 28, 2015

    Click here to listen/view the Web Conference recording
    Click here to download the slidedeck
    Click here 
    to take the CPE quiz to download your Certificate of Attendance

     

    Web Conference Overview:

    Last year we were hit with multiple Open Source vulnerabilities. The most significant was Heartbleed, or was it the potential of Poodle or the other half dozen or so vulnerabilities.  If it wasn’t that, then what about ShellShock (the bash bug?  The open source world is supposed to be safer as everyone can examine the software, but are enough experts examining it? 

    Join the conversation: #ISSAWebConf


    Moderator and Speakers:


    Moderator:

    Phillip Griffin
    ISSA Educational Advisory Council Member

    Phillip is a CISM and ISSA Fellow with over 20 years of information assurance experience. Phil has served as a trusted security adviser, security architect, and consultant with leading corporations. He has acted as committee chair, editor, and head of delegation in the development of US national and international security standards, and he currently serves on the ISSA Educational Advisory Council. His current work encompasses encryption technologies, access control, and biometric information security management policy. Phil has nine U.S. patents at the intersection of biometrics, RFID, and information security, a number of academic and professional technical publications, and he has spoken at leading security conferences around the world.

    Speakers:

    Mark Kadrich
    CISO & Privacy Officer, San Diego Health Connect

    Mark Kadrich is a well-known speaker and evangelist on network security. For the past 25 years, he's worked in the security community, building knowledge, and contributing solutions. His strengths are in architecture level design, solution design, policy generation, endpoint security, and risk management. Mr. Kadrich holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering. Mr. Kadrich authored the book Endpoint Security (Addison Wesley) and was a contributing author in publications such as Health IT Outcomes, TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, SANS and The Black Hat Briefings. Recently, Mark has been working with his colleagues at Emagined Security filling positions as a CISO and a PCI compliance architect. He is responsible for crafting new policy and procedures regarding installation, use, testing, and compliance for both a health information exchange and a large and diverse retail service enterprise.

    Tim Jarrett
    Director, Enterprise Security Strategy

    Tim Jarrett is Director of Enterprise Security Strategy at Veracode, where he works with a wide array of enterprise and software companies to evangelize successful application security strategies and learn from customer experiences. He joined Veracode in 2008, after industry experience at Microsoft and AMS (now CACI), where he helped build Veracode's static analysis technology and cloud platform as a product manager. A Grammy-award winning choral singer with a Bacon number of 3, he can be found on Twitter at @tojarrett

     Sponsored by:

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### February 2019 ISSA Web Conference - Information Systems Security Association ISSA Thought Leadership Web Conference February 2019
    Contact Us   |   Print Page   |   Sign In   |   Register
    February 2019 ISSA Web Conference




    ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM

    Recorded (1 Hour Event) on Wednesday, February 20, 2019

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    With the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision makers to look for when evaluating potential candidates. Discussion points include:

    - Advanced processing and analytics
    - Automated threat detection and prioritization
    - Facilitated incident investigation and triage
    - Proactive (and reactive) threat hunting


     

    Moderator:

    Lucas Varela, CyberSecurity Architect, Caixabank

    Lucas Varela Negreira is e-Crime and Security Analytics Manager. He is member of the CyberSecurity Team at Caixabank, as well as CyberSecurity Architect within the Information Security Team at the same bank. His work includes the application of intelligent systems for the detection of threats, the study of efficiency within incident repsonse processes and the study of banking malware.


    Speakers:

    Orion Cassetto, Sr. Director Product Marketing, Exabeam

    Orion Cassetto, Sr. Director Product Marketing at Exabeam, has nearly a decade of experience marketing cybersecurity and web application security products. Prior to Exabeam, Orion worked for other notable security vendors including Imperva, Incapsula, Distil Networks, and Armorize Technologies. He is a security enthusiast and frequent speaker at conferences and tradeshows.



    Brian Engle, CISO, Managing Director CISO Advisory, CyberDefenses, Inc.

    Brian Engle is the Chief Information Security Officer & Managing Director of Advisory Services for CyberDefenses. Brian heads up the internal cybersecurity program for CyberDefenses while leading the consulting group that provides their dynamic and growing client base with strategic advisory services, information security program assessment, and cybersecurity program maturity evolution.


    Prior to joining CyberDefenses, Brian was an independent cybersecurity consultant and founder of Riskceptional Strategies. Other roles included the Executive Director of the Retail Cyber Intelligence Sharing Center (R-CISC), the home of the Retail Industry Information Sharing and Analysis Center. Additionally, Brian served as CISO and Cybersecurity Coordinator for the State of Texas, CISO for Texas Health and Human Services Commission, CISO for Temple-Inland, Manager of Information Security Assurance for Guaranty Bank, and Senior Information Security Analyst for Silicon Laboratories.

    Brian has been a professional within Information Security and Information Technology for over 25 years, is a member and leader in numerous industry groups and associations, and holds CISSP and CISA certifications.

     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### September 2016 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference September 2016
    Contact Us   |   Print Page   |   Sign In   |   Register
    September 2016 ISSA Web Conference




    Security Architecture & Network Situational Awareness

    Recorded (2 Hour Event) on Tuesday, September 27, 2016

    Click here to view the recording.
    Click here to take the CPE quiz.

    Generously sponsored by


    RedSeal. The measure of resilience.



    Overview:

    IoT, BYOD, Clouds, IAS, SAaS, and a host of other things – these are all symptoms of our real security problem. Every day we add to our corporate architecture and we don’t think about the architectural modeling, the security of those elements or how those elements will impact it. This session will cover strategies for defining architectures, how to remodel your security architecture for 2017, and how to measure your exposure.

    • Do you often wonder what kind of security architecture you have? Feel like you have a straw, wooden, or brick security structure?

    • While we have repeatedly talked about point vulnerabilities, we have missed the fact that it is about the architecture that is being attacked. Yet we tend to ignore modeling the security architecture and access paths, measuring risk and prioritizing response to threats.

    • What is going on when the security architecture fails? How can you measure risk? How can you increase situational awareness?


    Moderator:

    Mark Kadrich

    For the past 25 years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. Mr. Kadrich serves as CISO at SDHC Health Exchange in San Diego and as CISO for 211 San Diego. He holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering.


    Speakers:

    Ben Tomhave, MS, CISSP

    Ben Tomhave is a security architect with New Context, a lean security firm. He holds a Master of Science in Engineering Management from The George Washington University and is a CISSP. He has previously held positions with Gartner, AOL, Wells Fargo, ICSA Labs, LockPath, and Ernst & Young. He is former co-chair of the American Bar Association Information Security Committee, a senior member of ISSA, former board member at large for the Society of Information Risk Analysts, and former board member for the OWASP NoVA chapter. He is a published author and an experienced public speaker, including speaking engagements with the RSA Conference, MISTI, ISSA, Secure360, RVAsec and RMISC, as well as Gartner events.

    Jerry Sto. Tomas, CISSP, CISM, MSIA

    Jerry Sto. Tomas is the Chief Information Security Officer for Apria Healthcare, a leading provider of home respiratory services and medical equipment including oxygen therapy, inhalation therapies, sleep apnea treatment, and negative pressure wound therapy. As the CISO, he is responsible for the development and execution of enterprise information security strategic plan and roadmap.

    Sto. Tomas has over 20 years of IT, privacy, and information security experience. As the head of Global Information Security at Allergan for eight years, he established the Information Security Department and executed successful global security programs such as Security Awareness, Data Loss Prevention and Privacy, Vendor Risk Management, Vulnerability and Threat Management, and eDiscovery. He was also the Chief Security Officer for The Impac Companies and Global Information Security Advisor for Celestica, Inc. where he was involved in various aspects of information and physical security such as strategic planning, architecture design, incident response, and security audit and assessments.

    Sto. Tomas studied business administration at the University of Santo Tomas, Philippines and Colorado Technical University. He also holds a master’s degree in information assurance from Norwich University and is a CISSP (Certified Information Systems Security Professional) and a CISM (Certified Information Security Manager).

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### #####EOF##### July 2018 ISSA Conference - Information Systems Security Association ISSA International Web Conference January 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    July 2018 ISSA Conference




    ISSA International Series: Trials & Tribulations of Social Engineering

    Recorded (2 Hour Event) on Tuesday, July 24, 2018

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    We all know about social engineering and phishing; but ‘Is it as simple as sending an email or asking for a click?’ probably not. As hackers and attacks evolve, they will go from simple tricks to very sophisticated attacks. So how do we know what these attacks will be? Simply, we can’t. So how can we detect the new attacks? This session will cover the state of the attacks and the directions they are taking. Ultimately, we will discuss strategies and how we can define the science that will evolve to thwart the evolving various attacks

     

    Moderator:

    Pete Lindstrom, IDC

    Pete Lindstrom is Research Vice President for Security Strategies. His research is focused on digital security measurement and metrics, digital security economics, and digital security at scale. Mr. Lindstrom is responsible for driving the vision of enabling digital transformation through proper technology risk management that makes efficient and effective economic decisions supported by evidence and outcome analysis leading to a security model that aligns with the 3d platform.
    Prior to joining IDC in 2014, Mr. Lindstrom accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the "Four Disciplines of Security Management" (a security operations model), and the "5 Immutable Laws of Virtualization Security," which was integrated into guidance from the PCI Council.
    Mr. Lindstrom is a frequent contributor to popular business and trade publications. He is often quoted in USA Today, WSJ Online, Information Security Magazine, VAR Business, Searchsecurity.com, and CSO Magazine. His columns and articles have appeared in Information Security Magazine, Searchsecurity.com, ISSA Journal, and CSO Online. Additionally, Mr. Lindstrom is a popular speaker at the RSA Security Conference, InfoSec World, ISSA International Conference, and many regional conferences.
    In addition, to his extensive industry experience, Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.



    Speakers:

     

    Ben Rothke, Senior Security Consultant, Nettitude

    Ben Rothke, CISSP, CISM, CISA is a Senior Security Consultant with the Nettitude and has over 15 years of industry experience in information systems security and privacy. His areas of expertise are in risk management and mitigation, security and privacy regulatory issues, design & implementation of systems security, encryption, cryptography and security policy development.

    He is a frequent speaker at industry conferences, such as RSA and MISTI, holds numerous industry certifications and is a member of ASIS, Society of Payment Security Professionals and InfraGard.

    He holds the following certifications: CISM, CISA, CGEIT, CRISC, CISM, CISSP, SMSP, PCI QSA

     

    Andrew Lewman, Laxdaela Technology

    Andrew has more than 30 years of global technology experience in a variety of domains, including information security, systems administration, and data management. His interest lies in the intersection of technology and humans. He’s been a co-founder and top executive at many high-growth start-up companies, such as TechTarget, The Tor Project, Farsight Security, and now DarkOwl. He’s an adviser with military and intelligence agencies in the US and its Allies, having worked on SAFER Warfighter, MEMEX, SHARKSEER, CRISP, and others. He’s a technical adviser to the Thorn Foundation, Global Emancipation Network, and Interpol’s Crimes Against Children Initiative. He’s a speaker and frequent media contact for conferences, invited speeches, with extensive television, written, and Internet-media press experience. Publications with EMCDDA and Fordham University Press. Andrew’s most recent publication is in the European Monitoring Center for Drugs and Drug Addiction on Tor and Links with Cryptomarkets. He’s the Treasurer for Emerge, helping to stop domestic violence through counseling abusers, and Chairman of Each One Teach One, providing economic opportunity for women and girls through technology.

     

    Paul Williams, CEO, Clarity Consulting Corporation

    Paul Williams, IAM, IEM, ACE is the Chief Executive Officer of Clarity Consulting Corporation, a Houston-based business profitability & efficiency
    optimization consulting firm which places heavy emphasis on effective cyber security across the enterprise. Paul is a nationally known public speaker in the information security field with experience across the breath of the cyber security field and multiple fields of technology. Paul has spoken at more than 260 conferences and seminars across the U.S. and internationally over the past 17 years, frequently as a paid keynote speaker.

    Paul’s favorite speaking topics include complex employee insider threat investigations; the detection, investigation, remediation and prevention of advanced malware in enterprise networks; cyber security counter-intelligence; weapons development and defense related technologies;
    software quality test engineering; and enterprise network reengineering for improved security, reliability, functionality, scalability at reduced cost of network ownership. Many of Paul’s presentations have been paid keynote addresses, and he has been featured on television and radio
    programs both in the U.S. and Europe.

    Additionally, Paul has been a speaker at more than 60 universities, colleges, public and private corporations and nonprofit organizations across the nation and internationally and has been featured on multiple television, radio, newspaper and magazine reports in the United States and Europe.

     

    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4

    Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.



    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### January 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference January 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    January 2018 ISSA Web Conference




    2017 Year in Review & Predictions for 2018

    Recorded (2 Hour Event) on Tuesday, January 23, 2018

    Click here to view the recording.
    Click here for the presentation.

    Click here to take the CPE quiz.


    Overview:

    2017 was a horrendous year in cyber security every month was filled with major breaches, hacks, and attacks surfacing. The nature and range of the attacks varied from email hacking to recently announced vulnerabilities being exploited, from minor incursions to (potentially) everyone’s financial history being stolen. 2017 will probably go down as the worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2018 bear the full weight and impact of the events of 2017, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2018 landscape?

    Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2018 challenges to InfoSec.
     

    Panelists:

    Michael Angelo, Chief Security Architect, Micro Focus | NetIQ

    Michael F. Angelo CRISC, CISSP has over 30 years of information assurance experience. Michael has served as a trusted security advisor and security architect with leading corporations and government entities. He has acted as a technical adviser in the development of US national and international export controls. Currently chairs the ISSA International Webinar committee. Amongst his accomplishments he is an ISSA Fellow, and is named on the ISSA Hall of FAME for his contributions to the security community. In addition, he currently holds 60 US Granted Patents. His current work encompasses certifications, SDL, Threat Modeling, AppSec / DevOPS, as well as and Software Supply Chain analysis. Michael is a veteran moderator and has appeared at numerous International conference and in a multitude of International Web Conferences.

     

    Shivaun Albright - Chief Technologist – Printing Security Office Printing Solutions – LaserJets HP Inc.

    Shivaun Albright is the Chief Technologist for Printing Security responsible for defining the security strategy for HP’s Printing and Imaging fleet which includes all facets of enterprise printing and imaging security. She has twenty – plus years of software engineering experience ranging from software engineering development, network protocols and security, international standards development and managing / coordinating technical inter-company initiatives. She has six years’ experience as standards committee chair responsible for the development of industry-wide plug-and-play networking protocols for printing and imaging devices. Shivaun has co-authored 7 patents.

    Jedidiah Bracy – IAPP, Editor, Privacy Perspectives & Privacy Tech

     

    Jedidiah Bracy is the publications editor for the International Association of Privacy Professionals, the world’s largest association of privacy pros. He oversees a team of writers who produce daily and weekly, regional newsletters on the latest privacy and data protection news. In addition to being the IAPP’s tech and opinion editor, Bracy reports on developments in information privacy and blogs about the intersection between privacy, technology, and society. Bracy also manages the IAPP’s Privacy Tech Vendor Report, a guide that maps out the emerging privacy tech space.

     

    Kim Jones, Director, Cybersecurity Education Consortium Arizona State University

     

    Kim L. Jones is a 31-year intelligence, security, and risk management professional with expertise in information security strategy; governance & compliance; security operations; and risk management. Professor Jones is a former Chief Security Officer who has built, operated, and/or managed information security programs within the financial services, defense, healthcare, manufacturing, and business outsourcing industries. Jones holds a Bachelor’s Degree in Computer Science from the United States Military Academy at West Point, and a Master’s Degree in Information Assurance from Norwich University. He also holds the CISM and CISSP certifications

     

    Keyaan Williams, President, ISSA International Board of Directors

     

    Keyaan Williams has dedicated more than two decades dedicated to leadership in privacy, information security, and risk management. For more than ten years, he provided security leadership at the Centers for Disease Control and Prevention (CDC). He also applied extensive industry and consulting experience to help other security, risk, and privacy leaders in start-ups, small business, non-profit, and university enterprises build successful governance, risk management, and compliance (GRC) programs.


     


    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### International Web Conference for August 2016 - Information Systems Security Association ISSA International Web Conference for August 2016
    Contact Us   |   Print Page   |   Sign In   |   Register
    International Web Conference for August 2016


    IoT: The Information Ecosystem of the Future--And Its Issues

    Recorded (2-Hour Live Event) Tuesday, August 23, 2016
    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Click here to view the recording.
    Click here to take the CPE quiz.



    Generously sponsored by


    Giving the Internet an Identity




    Overview

    The Internet of Things is a radical game changer. With the number of new devices being linked to networks growing larger every day, so too are the potential dangers. With great change comes great regulation, but are policy makers and industry leaders equipped with the necessary data and risk management skills needed to properly guide us safely into this new world? Join ISSA as we examine the myths, realities, promises and dangers of this rapidly emerging information security frontier.



    Moderator

    Philip H. Griffin

    Phillip is a CISM and ISSA Fellow with over 20 years of information assurance experience. Phil has served as a trusted security adviser, security architect, and consultant with leading corporations. He has acted as committee chair, editor, and head of delegation in the development of US national and international security standards, and he currently serves on the ISSA Educational Advisory Council and the ISSA Journal Editorial Advisory Board. His current work encompasses encryption technologies, access control, and biometric information security management policy. Phil has ten U.S. patents and additional patents pending at the intersection of biometrics, RFID, and information security. He has a number of academic and professional technical publications and he has spoken at leading security conferences around the world.



    Speakers

    Mark Cather

    Mark is the Chief Information Security Officer (CISO) at UMBC and has over 20 years of experience in higher education information technology, communications, construction, and security. He is a Certified Information Systems Security Professional (CISSP) and has a wide range of engineering and management experience at various levels within an IT organization. In addition to his role as CISO, he is also co-chair of the Internet2 End-to-End Trust and Security Working Group, co-chair of the Internet2 Innovation Program Advisory Group, and a member of the University System of Maryland IT Security Council.



    Wayne Harris

    Wayne Harris is a principal consultant for PKI Professional Services at Certified Security Solutions (CSS) and responsible for client PKI design and enterprise architecture solutions, as well as directing the deployment and operations of client PKI services. Wayne manages the CSS PKI practice standards and develops the company’s comprehensive PKI services, including PKI readiness reviews, health checks, design and deployment, management software and managed services. Wayne has extensive experience implementing enterprise solutions using Active Directory, SMS, Exchange and SQL; holding professional certifications in Microsoft Certified Systems Engineer and Microsoft Certified IP Professional. Wayne’s professional background includes four years with Microsoft Consulting Services implementing infrastructure solutions for enterprise clients. During this time, Wayne was instrumental in delivering one of the world’s largest Active Directory designs. Prior to that Wayne worked as a network engineer with NASA. Wayne also served in the US Marine Corps, where he worked on voice radio cryptography.



    Nicholas R. Merker

    Nick Merker is a partner and co-chair of Ice Miller’s Data Security and Privacy Practice. With almost a decade of hands-on, pre-legal computer systems, network, and security experience in the public and private sector, Nick bridges the gap between information technology and the law. Privacy law and technology are both constantly changing - Nick assists clients by analyzing laws against emerging technology and preparing clients to address regulatory and contractual audits, customer expectations, and assessment of risk. Clients seek Nick’s counsel in all areas where privacy and data security is at issue, including PCI-DSS, the HIPAA Security Rule, online privacy statements, vendor contract issues, the EU Data Protection Directive, anti-SPAM issues, regulatory enforcement, privacy due diligence in mergers and acquisitions, privacy audits (i.e. GAPP), and data security standards and audits (i.e. NERC, SSAE 16, etc.). Nick also strives to educate others on trending privacy issues. He is Faculty at the International Association of Privacy Professionals where he leads privacy training across the globe to executives, engineers, lawyers and managers. Nick teaches a Data Security and Privacy Law course at the Robert H. McKinney School of Law at Indiana University, and is a frequent author and speaker on privacy issues at conferences and in multiple publications.



    ISSA International Web Conferences occur on a monthly basis and provide CPE credits for continuing education. For more information and to see the upcoming schedule, click here.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### September 2018 ISSA Web Conference - Information Systems Security Association ISSA Thought Leadership Web Conference September 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    September 2018 ISSA Web Conference




    ISSA Thought Leadership Series: Eliminating Blind Spots in your AWS Environments 

    Recorded (1 Hour Event) on Wednesday, September 19, 2018

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    As consumption of cloud services increases, security teams struggle to maintain visibility of the cloud assets in use across multiple environments throughout the enterprise. In fact, 43% of security pros say lack of visibility into cloud environments are their biggest operational headache. Cloud defenders struggle to answer two simple, but important questions: what do I have, and is it secure? The only way to answer these critical questions is with comprehensive security visibility of your AWS public cloud environments.

    Join us for a discussion on gaining security visibility across all of your AWS accounts, including best practices for:
    - Discovering workloads and resources in use across your AWS accounts, services, and regions
    - Reducing your attack surface by identifying and remediating security issues
    - Finding and responding to critical risks using different assessment methods (agent-based, agent-less, API, etc.)

    Moderator:

    Mikhael Felker, Director Information Security & Risk Management, Farmers Insurance  


    Mikhael is Director of Information Security & Risk Management for Farmers Insurance.  He is also an Advisor for Safe-T Executive Advisory Committee.  In the past decade he has taken on number of information security roles including engineering, teaching, writing, research and management.  His sector experience includes insurance, defense, healthcare, nonprofit/education and technology/Internet, seeing first-hand the variance in information security culture and program maturity. Felker received his M.S. in information security policy and management from Carnegie Mellon University and B.S. in computer science from UCLA.  He has over 50+ publications and has been a speaker for RSAC, CSA, ISSA, ISACA, ISC2 and OWASP events.  





    Speakers:

    Alex Grohmann, CISSP, CISA, CISM, CIPT


    Mr. Grohmann (CISSP, CISA, CISM and CIPT) is founder of Sicher Consulting and and ISSA Fellow. He is the recipient of ISSA ‘Honor Roll’ and was president of the NoVa chapter for three years, winning Chapter of Year during that time. He is a graduate of the FBI’s Citizens’ Academy and served on the board of directors for the Washington DC chapter of InfraGard for four years. Currently Mr. Grohmann serves on the board directors of Northern Virginia Community College’s Workforce Development taskforce, NOVA Cybersecurity Advisory Board and is an mentor at MACH 37, the Virginia cyber security accelerator. He also sits on the IT sector coordinating council (IT-SCC)

     

    Edward Smith, Product Marketing Principal, CloudPassage


    Edward Smith has spent the last 5 years in the security industry and has over 20 years experience helping enterprise companies maximize the value from their technology investments. He is currently Product Marketing Principal at CloudPassage and has previously held various positions as a Marketing Leader, Systems Engineer, Sales Engineer, Support Manager, and Trainer for companies like Tripwire, Dell, Adobe, and Gateway.

     

    Dr. Matthew Hicks, DM, MBA, C|CISO , CISSP, CISM, PMP/RMP

     

    Matthew has over 30 years of Cyber Security and Technology experience in Government, Health Care, Financial, and Transpiration industries.  He has worked for Presidents Bush and Clinton as a member of the White House staff. Matthew has a Doctoral Degree in Management, a Master of Business Administration degree, and a Master of Science degree in management.  He holds the C|CISO (EC-Council), CISSP, CISM, CRISC, PMP, and RMP certifications. He has in-depth experience in HIPAA, PCI, NIST, FISMA, FRA, COBIT, ITIL and GDPR standards.  He is employed as a Senior Principal for Amtrak and is a member of the CISO Executive Forum and the ISSA CISO Advisory Council. 

     

     

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### CISO Guest Registration - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    CISO Guest Registration

    Home │ CISO Executive Membership Committee│ Guest Registration │Member Benefits │Membership Criteria

    Visit a CISO Executive Forum before you join!

    Join us at an upcoming CISO Executive Forum event. At these executive events you have the opportunity to enjoy presentations on pertinent industry topics, while connecting with other practicing professionals.

    Complete the form below and a staff member will contact you with additional information to be a guest at the next event. There is no charge for qualified first time guests to attend the program.

    CISO guest requests are subject to approval.

    The membership criteria below will act as a guideline for approval.

    CISO Membership applicants should be executive/senior-level information security professionals reporting directly to the CEO, CFO, CIO or the equivalent. In companies with more than 200 employees, CISO Executive Membership is open to qualified executive direct reports of the organization’s CISO. Individuals should be responsible for information security at the corporate or enterprise level within their organizations, be interested in discussing sensitive security issues with their peers, and be willing to share professional experiences.

    CISO Members employed by a company that sells a security product or service must meet the following additional requirements:

    1. The organization must have a clear separation between the internal security or research practitioner and those involved in sales, marketing or product management.
    2. The organization must have a minimum of 200 employees or a minimum of 2 direct reports to the CISO Member.
    3. The member must certify that he or she is not involved with the sales, marketing or product management of security products or offerings.
      Any sales activity within the CISO Forum, by non-sponsors, is expressly forbidden and grounds for cancellation of membership.

    Complete Membership Criteria »
    ISSA Code of Ethics »

    Please note: the guest program is limited to one time participation per person.

    By selecting "Yes" to the question below, I certify that I meet the qualifications for the CISO Guest Program and have read and agree to the ISSA International Code of Ethics.


    Please hover over any question with "..." to see the whole question.








    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### November 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference November 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    November 2018 ISSA Web Conference




    ISSA Thought Leadership Series: The Threat Intelligence Playbook: Keys to Building Your Own Threat Intelligence

    Recorded (1 Hour Event) on Wednesday, November 7, 2018

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    Acronyms such as IOCs (indicators of compromise) and IOAs (indicators of attack) are ubiquitous in the security industry. But a recent SANS Institute survey revealed that a vast majority of security professionals don't even know how many indicators they receive or can use. Join DomainTools Sales Engineer, Taylor Wilkes-Pierce to learn how IOCs and IOAs can work in tandem to build your own threat intelligence, enrich your investigations and overall security strategy.


    In this webinar, you will learn:

    How security professionals go about sourcing indicators
    What can you do with IOCs/IOAs after locating valuable indicators
    To pivot through threat actor infrastructure and determine the "Who" and the "How Bad".


     

    Moderator:

    C-A Washington, Founder and President, Image & Etiquette Institute

    Chanel-Alexandria “C-A” Washington is the founder and president of the Image & Etiquette Institute, a personal image and organizational branding firm dedicated to empowering clients using Appearance, Relationships, and Credibility to achieve their most important goals. Prior to becoming an author, speaker, and trainer, C-A served in numerous leadership roles in both state and federal government agencies, as well as in the private sector.  C-A is an associate of the Georgia Chapter of the National Speaker’s Association, Emily Post Institute trained business etiquette trainer, former board member of the Association of Image Consultant’s International - DC Chapter, and alumna of the Harvard Kennedy School’s Women and Power program.  With her experience and expertise, C-A specializes in helping leaders and teams convey excellence with civility, style, and charm because she firmly believes that with the right techniques and habits, we can all communicate with confidence and connect more authentically. 




    Speakers:

    Taylor Wilkes-Pierce, Sales Engineer, Domain Tools

    Taylor Wilkes-Pierce, Sales Engineer at DomainTools has over 10 years of experience in technology sales with stops at Verizon, Amazon, and Virtuozzo along the way to DomainTools. Although Taylor loves all things infosec, he has a fond spot for container virtualization, software defined storage, and basketball.

     

    Greg Reith, Sr. Solutions Architect, CenturyLink

    Greg Reith began his career with U.S. Army Special Forces with a specialty in Operations and Intelligence. Greg’s experience includes counter intelligence, intelligence analysis and collection at both tactical and strategic levels. At the end of his career in the military, he transitioned into Information Technology and was the Information Systems Security Officer responsible for securing Special Operations classified and unclassified networks.
     Prior to CenturyLink, Greg led the T-Mobile threat intelligence team and developed the T-Mobile threat intelligence strategy and capability. Throughout his career Greg has worked for or consulted to organizations to include federal agencies, state agencies, multi state lottery, Microsoft, AT&T, T-Mobile, power companies, banks and other organizations. Greg’s capabilities include but are not limited to, risk management, penetration testing and red-teaming, vulnerability management, security architecture, threat intelligence proofing and deploying security technologies among others
     Greg has written multiple patents in the fields of threat intelligence, big data security and identity management.
     Greg has been a speaker at multiple venues to include the Cloud Security Alliance, RFUN (Recorded Future Conference), ISACA, AGORA and others.


    Ken Dunham, Senior Director, Technical Cyber Threat intelligence, Optiv

    Ken Dunham brings more than 28 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence to his position as senior director of technical cyber threat intelligence for Optiv. In this role, he is responsible for the strategy and technical leadership to mature Optiv’s data integration and innovation of intelligence-based security solutions.  He also runs his own advanced intelligence response company, 4D5A Security LLC, and a non-profit for incident responders around the world called Rampart Research.  Mr. Dunham has a long history of innovation for nascent technologies and solutions such as creation of training programs for U2, Warthog, and Predator systems for the USAF, responsible disclosure (iDEFENSE), and cyber threat intelligence (iSIGHT Partners).  He is a widely published author with thousands of security articles and multiple books on topics ranging from Darknet disclosures to mobile threats and mitigation of malware.

     



    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    Member Login
    Welcome to the online community. Because of the built-in security features, you must first register and be approved before accessing many site sections. If you are not a member of the site yet, please register - we'd love you to be part of our online community. 

    Forgot your password?
    Click here to reset your password.

    Haven't registered yet?
    Click here to Register
    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### January CISO Forum Scottsdale 2018 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    January CISO Forum Scottsdale 2018


    CISO Forum Cyber Resilience and Response: Keeping the lights on in the face of cyber attacks

    Theme  |  Registration  |  Hotel Reservations & Transportation  |  Agenda  |  Sponsors



    Theme: Cyber Resilience and Response: Keeping the lights on in the face of cyber attacks
    Date: January 25-26, 2018

    Location: Scottsdale Marriott at McDowell Mountains

    The January ISSA CISO Executive Forum in Scottsdale, AZ will focus on Cyber Resilience: Keeping the lights on in the face of cyber attacks. Our interactive sessions will explore these trends and discuss: Anatomy of Paying the Ransom, the Forensics Tabletop, Public Cloud IR Preparedness, GDPR Impacts on IR, The Story of the OneLogin breaches. You’ll return to your organization armed with practical methods to address current issues, and can guide your teams to focus on areas of highest risk. Join your peers at this exclusive, CISO-only event.

    Registration:

    Type Fees and Benefits Registration Link
    ISSA CISO Executive Members

    Complimentary meeting registration and one complimentary night of hotel accommodations*

    click here to register

    learn about CISO Executive Membership here
    First Time CISO Guests or CIO/CTO Guests Complimentary meeting registration click here to apply
    (attendance is subject to approval)
    Returning Guests $500 click here to apply**
    (attendance is subject to approval)

    *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel by 12/27/17 in the ISSA room block to qualify for complimentary one (1) night lodging.

    **Upon verification of eligibility, guest will be invoiced for the $500 registration fee

    Scottsdale Marriott at McDowell Mountains:

    Venue: Scottsdale Marriott at McDowell Mountains
    16770 N Perimeter Dr
    Scottsdale, AZ 85260

    Click here to reserve your room at the Scottsdale Marriott at McDowell Mountains. The daily rate is $190 plus state and local taxes. Reservations are available until December 27, 2017 or until the block sells out, whichever comes first. Space is limited. 

    Transportation:
    New to Uber? Join here to earn up to $15 off your first ride!

    Agenda:

    Thursday, January 25, 2018


    5:00 p.m. - 8:00 p.m.

    Presentation by
    Larry Ponemon
    Chairman & Founder and CIPP, Ponemon Institute

    Friday, January 26, 2018

     

    8:00 a.m. - 8:50 a.m.

    Registration and Breakfast

    8:50 a.m. - 9:30 a.m.

    Opening Comments and Welcome Address

    9:30 a.m. - 10:30 a.m.

    Anatomy of Paying the Ransom
    Mike Weber
    Vice President at Coalfire Systems

    10:30 a.m. - 11:00 a.m.

    Networking Break

    11:00 a.m. - 12:00 p.m.

    Forensics Tabletop
    Kristy Westphal

    Senior Manager - Security Tools, Charles Schwab 

    12:00 p.m. - 1:00 p.m.

    Lunch

    1:15 p.m. - 2:15p.m.

    Public Cloud IR Preparedness

    Michael Leigh
    Global Head of Digital Forensics and Incident Response, NCC Group

    2:15 p.m. - 2:30 p.m.

    Networking Break

    2:30 p.m. - 3:30 p.m.

    GDPR Impacts on Incident Response

    Panelist:

    Stephen Edmonds
    Director of Security and Compliance, Ping Identity

    3:30 p.m. - 4:00 p.m.

    Networking Break

    4:00 p.m. - 5:00 p.m.

    Two Apples, a Grapefruit and a Kumquat:  Training and Creating Better Incident Responders
    Kim Jones
    Director, Cybersecurity Education Consortium, Arizona State University

    5:00 p.m. - 5:15 p.m.

    Sponsor Prize Drawing

    5:15 p.m. - 8:00 p.m.

    Post-Forum Reception 


    Questions? Please contact
     Sean Bakke: 1 781 569 6607.


    Sponsors:
    For sponsorship opportunities, please contact Nancy Mucci: 1 781 569 1941.

    ____________________________________________________________________________________________________

    Platinum Level Sponsor


     

    Gold Level Sponsors

     

            

    Silver Level Sponsors

                          

     

    Partner

     


     
            

         


    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Information Systems Security Association

    Contact Us   |   Sign In   |   Register



      

    Developing and Connecting Cybersecurity Leaders Globally

    Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field. What can we do for you today?

    If you currently hold certifications, you can earn CPE credits by attending chapter meetings, ISSA Web Conferences, reading or contributing an article to the ISSA Journal or volunteering for activities associated with putting on educational meetings or conferences.

    Developing and Connecting Cybersecurity Leaders Globally

    Through involvement with your chapter and access to ISSA International resources, you can turn that value statement into a roadmap for your career and a vision for driving our own destiny as cybersecurity professionals. This is a growing field with a shortage of qualified professionals to fill out our security teams. Together we can use our collective knowledge and expertise to enhance our stature and influence within our companies and organizations.

    "As IT security professionals, we are often called upon to advise a wide spectrum of issues. By being fully engaged in a peer organization that shares information, our abilities are enhanced to adapt and respond appropriately.”
    Mike Godsey, Central Ohio Chapter

    Get the most out of your ISSA membership:

    Log in for access to your chapter group and other members-only resources.

    Thank You for Investing Your Time, Talent and Energies for the Betterment of ISSA and the Profession.

    Your dedication pays off in thriving chapters, engaged members, lifelong professional connections and leadership skills. Log in for resources and materials to help you with chapter management, development and growth.

    Joining the Metro Atlanta ISSA Chapter has been the best career move I have made on many fronts. As a chapter member I have expanded my network within the profession, widened my circle of influence and increased the breadth of my knowledge. As a chapter officer, I have received excellent training and experience in leadership, teaching and vendor relationships.”
    Damien Suggs, Metro Atlanta

    Whenever we can be of assistance, don’t hesitate to get in touch with our member services team, memberservices@issa.org , +1 (703) 382-8205 (local/international).

    Partnering with ISSA International is a great opportunity to reach a targeted audience of information security professionals. Our members value your support and educational contributions in advancing the information security community.

    Reasons companies that support ISSA reach a targeted audience of information security professionals

    • 81% of members come from companies with more than 1,000 employees
    • Web marketing programs reach all 10,000 active members around the world
    • 53% of members have an annual IS budget of more than $5 Million
    • 60% of members are CISSP Certified
    • 95% of members make, influence, or support purchasing decisions
    • Customized sponsorship packages designed to fit into your marketing strategy

    Please contact Sean Bakke for a copy of the Media Kit.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA



     

    Copyright © 2017, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### #####EOF##### March 2016 - Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    March 2016




    Security Software Supply Chain:
    Is What You See What You Get?


    2-Hour live event Tuesday, March 22, 2016

    Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

    Click here to view the recording.
    Click here to take the CPE quiz.
    Click here to view the slides.


     

    Overview:

    Software is the foundation of our computer eco-system and, just like in the real world, it doesn't take a lot to upset them.  In the non-cyber world, it has been often said 'We are what we eat'. In the Cyber world this is still true--especially when we consider an organizations inclusion (or consumption) of software. When we buy products and include them in our infrastructure, we perform acceptance testing, in order to make sure they work and have no known vulnerabilities. Unfortunately we don't know what components are in the products. We also don't know if the product was built entirely by the software provider or did they use components from somewhere else.

    This session will cover issues with software supply chain and development operations. It will cover the basics, including the current state of software supply chain analysis, and attempt to provide pointers on how to figure out what is in a supply chain and what the information can be used for.


    Moderator:

    Mark Kadrich

    Chief Information Security & Privacy Officer, San Diego Health Connect

    For the past 25 years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. Most recently, Mr. Kadrich has been working with his colleagues at Emagined Security filling positions as a CISO and a PCI compliance architect. He is responsible for crafting new policy and procedures regarding installation, use, testing, and compliance for both a health information exchange and a large and diverse retail service enterprise. Recently, Mark architected large crypto services environments and secure network environments. He holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering.

    Speakers

    Michael F. Angelo
    Chief Security Architect, Micro Focus | NetIQ
    Michael is well known in the security community with his work designing, developing, implementing and deploying security products and architectures for multi-national corporate environments. His work includes participating, driving, and creating security standards, working on corporate policies, national and international legislation, multi-national regulatory issues, and participation in numerous international and national advisory councils. He has been a featured speaker at numerous national and international security conferences including RSA, ISSA, and InfoSec. Currently, he chairs the ISSA International Webinar Committee and is a technology contributor to the U.S. Department of Commerce Information Systems Technical Advisory Council. Michael currently holds 57 U.S. patents, is a former Sigma-Xi distinguished lecturer and is the recipient of the Trusted Computing Platform Alliance (TCPA) lifetime achievement award. In 2011 he was recognized by ISSA as the Security Professional of the Year and in 2013 he was named to the ISSA Hall of Fame.


    Jonathan Knudsen
    Cybersecurity Engineer, Synopsys
    At Synopsys, Jonathan enjoys breaking software and teaching how to make software better. Jonathan is the author of books about 2D graphics, cryptography, mobile application development, Lego robots, and pregnancy. He lives in Raleigh, North Carolina.


    Derek E. Weeks
    VP and Rugged DevOps Advocate, Sonatype

    In 2015, Derek led the largest and most comprehensive analysis of software supply chain practices to date across 106,000 development organizations.  His research detailed the consumption of billions of open source and third-party software components while also shedding new light on the scale of known vulnerable software being ingested by development organizations worldwide.  Derek is a huge advocate of applying proven supply chain management principles into development and application security practices to improve efficiencies, reduce security risks, and sustain long-lasting competitive advantages. He currently serves as vice president and Rugged DevOps advocate at Sonatype. Derek is a distinguished international speaker, having delivered his research at AppSec USA, InfoSec Europe, LASCON, HP Protect, Air Force Cyber Security Forum, and numerous OWASP meet-ups.


    Henrik Plate
    Senior Security Researcher, SAP SE

    Henrik Plate works as a Senior Researcher in the Product Security Research group within SAP since 2007. During this time, he was coordinator and scientific lead of the European FP7 research project PoSecCo, built up an SAP-wide security training for application developers and performed security assessments of SAP applications. Currently, he researches new approaches and tooling for ensuring a secure consumption of third party components in the software supply chain. Before joining the SAP research group, Plate held different positions as a software engineer, and studied computer science and business administration at the University of Mannheim. He holds a diploma from the University of Mannheim and is a CISSP.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### February 2019 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference February 2019
    Contact Us   |   Print Page   |   Sign In   |   Register
    February 2019 ISSA Web Conference




    ISSA International Series: DevOps/AppSec, The State of the World

    Recorded (2 Hour Event) on Tuesday, February 26, 2019

    Click here to view the recording.
    Click here for the presentation.
    Click here to take the CPE quiz.


    Overview:

    Over the past few years the focus has shifted from ‘does the code have vulnerabilities?’ to issues of ‘could the code have vulnerabilities?’. Of course the later created the question – How would we know? Now, just when we thought we understood things, we realize that we are changing again. Not only is the code and its components are important, but so is the question of the development environment. This webinar will go cover the state, changes, and new directions we are being faced with.

     

    Moderator:

    James R. McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy

    James R. McQuiggan, CISSP is the Product & Solutions Security Officer of the Service Americas division at Siemens Gamesa Renewable Energy. He is responsible for developing the strategy and policies for securing the SCADA products deployed to America’s customers. With over 17 years at Siemens, James has consulted and supported various corporate divisions on cybersecurity standards, information security awareness and securing their networks.
    James is an ISSA member and the Past President of the Central Florida chapter from 2012 to 2016. He supported the ISSA International Conference as the Content Committee Chair from 2014 to 2017. He is a member of the Central Florida chapters of ISACA, Infragard and (ISC)2. Within (ISC)2, he is a member of the Advisory Council of North America and is the (ISC)2 Central Florida chapter President. James is the recipient of the 2016 (ISC)2 President’s Award and in 2017 he was awarded the first ever Julie Peeler Franz “Do it for the Children Award” as Volunteer of the Year for his work with the Safe & Secure Online Education program, that provides resources to help children, parents, educators and senior citizens stay safe online.
    Most importantly, James is the father of two teenage daughters and continues to make sure they are safe and secure online while using their smartphones and social media.


    Speakers:

    Derek Weeks, Vice President, Sonatype

    Derek E. Weeks is the world's foremost researcher on the topic of DevSecOps and securing software supply chains. For the past five years, he has championed the research of the annual State of the Software Supply Chain Report and the DevSecOps Community Survey. Derek is a huge advocate of applying proven supply chain management principles into DevOps practices to improve efficiencies and sustain long-lasting competitive advantages. He is a frequent keynote speaker and industry panelist at conferences like the RSA Conference, Bosch IoT Summit, Red Hat Government Summit, Carnegie Mellon's SEI Software Supply Chain Summit, and numerous DevOps Days events. He currently serves as vice president and DevOps advocate at Sonatype, creators of the Nexus repository manager and the global leader in solutions for software supply chain automation. Derek is also the co-founder of All Day DevOps, an online community of 65,000 IT professionals. In 2018, Derek was recognized by DevOps.com as the "Best DevOps Evangelist" for his work in the community.

      

    Matthew Small, Head of Solutions Architecture, Bitnami

    Matthew Small leads Solution Architecture for Bitnami. He is passionate about the cultural values and technology that enables teams to operate successfully in a cloud-native paradigm. To that end, he works with their hyperscale cloud provider partners as well as enterprise customers to leverage and integrate Bitnami's DevSecOps products and certified Open Source Software. Prior to joining Bitnami, Matthew spent 10 years at RightScale, a pioneer in multi-cloud and hybrid-cloud management and thought leader in cloud best practices. He has his head stuck in the clouds.

    James Rabon, Sr. Product Manager (SSC & Tools), Fortify

    Jimmy Rabon serves as a senior product manager for Fortify products at Micro Focus. In this role, he is responsible for defining the strategy, roadmap, and features for Fortify Software Security Center, Tools, and the Fortify ecosystem with the goal of making software more secure.

    Jimmy Rabon began his career as an application developer for the Computer Sciences Corporation developing in a variety of programming languages and frameworks before deciding to specialize in application security, joining Fortify software.

    An 8-year veteran of the application security industry, Jimmy began his career in this field by serving as a software security consultant for Fortify software. He has performed countless security audits (static and dynamic) of applications with a very large range of programming languages and technology stacks for both commercial and government enterprises. He has helped customers worldwide to understand and prioritize their security risks and provided the expertise necessary to build world class software assurance programs.

    Having worked as a software engineer for many years prior to specializing in application security, he understands the unique challenges that developers face when attempting to deliver secure code and can help deliver the effective technology and processes that enable effective application security at scale and speed.

    He held positions at Fortify of Software Security Consultant, Managing Consultant, Fortify Technical Director, and Fortify Services Director. He led a team of highly skilled application security consultants as the head of HPE Fortify professional services.

    Jimmy earned a bachelor’s degree in Management of Information Systems from Auburn University and is a Certified Secure Software Lifecycle Professional.

    Bjoern Zinnsmeister, CEO and co-founder, Templarbit

    Bjoern is the CEO and co-founder of Templarbit, a security company that helps businesses collect and use security intelligence to mitigate risk on web apps and APIs. Templarbit was part of Y Combinator’s summer 2017 batch. Prior to Templarbit Bjoern lead engineering at Synack, where he helped protect the Pentagon, DoD, IRS and Fortune 100 clients from security breaches.

    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### February 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference January 2018
    Contact Us   |   Print Page   |   Sign In   |   Register
    February 2018 ISSA Web Conference




    ISSA International Series: Privacy vs. Security

    Recorded (1 Hour Event) on Wednesday, February 14, 2018

    Click here to view the recording.
    Click here for the presentation.

    CPE quiz available soon.


    Overview:

    We are all concerned about Privacy. Every day there we hear about multiple PII breach announcements. Our current solution – lets create laws to require announcements and levy fines to encourage proper activities and protections. With GDPR looming on the horizon, as the most recent and perhaps the most comprehensive regulation yet, we find ourselves wondering if others will adopt similar regulations. If so, do we as security professionals need to be concerned about our ability to perform forensic analysis, and gather information outside of our realm of direct influence to identifier a hacker? Do elements of GDPR create a situation in which hunting for a hacker might violate their privacy rights? In the end will companies still be able to monitor and protect their assets as they do today, or will it require a change? This webinar will provide insight into the Privacy vs Security Debate.
     

    Moderator:

    Pete Lindstrom, IDC

     

    Pete Lindstrom is Research Vice President for Security Strategies. His research is focused on digital security measurement and metrics, digital security economics, and digital security at scale. Mr. Lindstrom is responsible for driving the vision of enabling digital transformation through proper technology risk management that makes efficient and effective economic decisions supported by evidence and outcome analysis leading to a security model that aligns with the 3d platform.

    Prior to joining IDC in 2014, Mr. Lindstrom accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the "Four Disciplines of Security Management" (a security operations model), and the "5 Immutable Laws of Virtualization Security," which was integrated into guidance from the PCI Council.

    Mr. Lindstrom is a frequent contributor to popular business and trade publications. He is often quoted in USA Today, WSJ Online, Information Security Magazine, VAR Business, Searchsecurity.com, and CSO Magazine. His columns and articles have appeared in Information Security Magazine, Searchsecurity.com, ISSA Journal, and CSO Online. Additionally, Mr. Lindstrom is a popular speaker at the RSA Security Conference, InfoSec World, ISSA International Conference, and many regional conferences.

    In addition, to his extensive industry experience, Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.

     

    Speakers:

    Brad Keller, Prevalent

    Brad is the Sr. Director of 3rd Party Strategy at Prevalent, Inc. where he focuses on the delivery of Prevalent’s third party risk management and assessment solutions. That focus includes assisting clients with the evaluation and enhancement of their 3rd party risk programs as well as ways to fully leverage their investment in Prevalent 3rd party products and managed services.

    Prior to joining Prevalent, he was a Senior Vice President with The Santa Fe Group focusing on the management of the Shared Assessments Program. At Shared Assessments he led the development of Shared Assessments tools, training, and the Certified Third Party Risk Professional (CTPRP) program. During his years in Banking, Brad was responsible for risk management, privacy, and regulatory compliance, including third party oversight. He was instrumental in the development and management of: business risk self-assessment and third party assessment programs; FFIEC-compliant authentication programs; and led key initiatives in anti-phishing and brand protection programs for the banks.

     

    Brad also served as an online privacy and compliance officer where in addition to online risk, he was responsible for online privacy and compliance across the enterprise. These responsibilities included: the implementation and management of the policies and processes for ensuring that third party contracts contained all appropriate and necessary privacy and security provisions, and the ongoing review and approval of all technology and security related vendor contracts. He was also responsible for online authentication and identity theft initiatives, led the development of commercial eCommerce strategy, implemented key retail eCommerce, and served as a member of the Corporate Risk Governance Committee.

     

    Brad’s extensive financial service experience includes managing regulatory examinations by the Federal Reserve, Securities and Exchange Commission, Federal Home Loan Bank Board, and the New York Stock Exchange; serving as a commercial loan and workout officer for a national bank; leading vendor management, anti-phishing and fraud initiatives for BITS; and, managing failed thrifts for the Federal Home Loan Bank Board. In his law practice, Brad spent more than 10 years in banking, commercial contract, bankruptcy, white-collar crime, and commercial litigation.

     

    Brad is a Certified Third Party Risk Professional (CTPRP) and serves as part of the CTPRP faculty. He is an active member of several Shared Assessments Working groups and serves as the Chair of the Vendor Risk Management Maturity Model Group.
    Brad graduated with honors from the University of Missouri with a B.S.degree in Finance and received his J.D. with honors from St. Louis University School of Law. He is admitted to practice law in Oklahoma.


     

    Mathieu Gorge, Vigitrust

    Mathieu Gorge is an established authority on IT security, risk management, and compliance with more than 15 years’ experience in Europe, Australia, and the United States. Mathieu is a PCI DSS (Payment Card Industry-Data Security Standard) and data expert. Mathieu is also President of the France Ireland Chamber of Commerce in Dublin, Ireland. In 2014, he was appointed French Trade Foreign Advisor by the French government— [Conseiller du Commerce Extérieur de la France.] Mathieu is in high demand as a speaker at global security conferences, such as RSA, ISSA, ENISA & ISACA. He also works closely with the PCI Council in the United States and European Union.

     

    Randy Sabett, Cooley, LLP

    Randy V. Sabett, J.D., CISSP, Attorney with Cooley LLP, began his career as a crypto engineer at the NSA and has spent over 20 years at the intersection of legal, technical, and policy aspects of cybersecurity and privacy. Mr. Sabett served on the Commission on Cybersecurity for the 44th Presidency and ISSA NOVA board, is a member of the Boards of Directors for the Georgetown Cybersecurity Law Institute and MissionLink, and has appeared on or been quoted in a variety of national media sources.

     

    James Jaeger, Arete Advisors

    Jim is the Chief Cyber Strategist for Arete Advisors. He has over thirty years of technical and leadership experience in both the federal government and industry. He has led incident response and forensic investigations into some of the largest cyber breaches to impact the US. Jim also has significant experience with cyber security gained during his tenure with the US Air Force and the National Security Agency. Jim established and led General Dynamics’ government and commercial cyber defense and forensics business practice, where he personally directed investigations into some of the largest and most complex network intrusions in history. Jim retired from the Air Force as a Brigadier General in 1997


    Community Search
    Sign In


    Calendar

    4/10/2019
    ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

    4/17/2019
    Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

    5/7/2019
    4th Annual Healthcare Cybersecurity Summit

    5/16/2019
    ISSA of Wisconsin - Annual Meeting and Conference

    6/13/2019 » 6/14/2019
    June CISO Executive Forum Boston, MA





    Copyright © 2016, Information Systems Security Association, All Rights Reserved
    Privacy Policy │ Copyright Information
    #####EOF##### Information Systems Security Association
    Contact Us   |   Print Page   |   Sign In   |   Register
    2016 ISSA International Conference Registration
    Tell a Friend About This EventTell a Friend
    2016 ISSA International Conference Registration

    Join ISSA for solution oriented, proactive and innovative sessions focused on security as a vital part of business.

    11/2/2016 to 11/3/2016
    When: November 2-3, 2016
    Where: Hyatt Regency Dallas
    300 Reunion Blvd.
    Dallas, Texas  75207
    United States
    Contact: Leah Lewis
    703-234-4082


    Online registration is closed.
    « Go to Upcoming Event List  

     

    Join ISSA for solution oriented, proactive and innovative sessions focused on security as a vital part of business. This conference offers unique guidance and resources that are carefully selected to assist security professionals at all levels to achieve a strategic mix of knowledge, skills and aptitudes, while also providing access to the strongest global network of experts and vendors across industries and skill sets.

    Registration Includes:

    • All sessions on November 2-3; including keynotes, breakout sessions, breakfast, and lunch both days
    • November 2 Party in the Sky (6pm at Reunion Tower)
    • November 3 Closing Exhibitor's Reception (5:30pm in the Exhibit Hall)
    • A certificate of attendance for continuing professional education (CPE), up to 16 hours available
    • Exclusive access to the ISSA International Conference mobile app for conference information and networking

    The ISSA Chapter Leaders Summit (November 1) and CISO Executive Forum (November 3-4) are open to qualified attendees only and require separate registration

     

    Conference Registration Fees:

    Early Bird Rates - Register by 6/30/16

    • Members*:  Registration is $349 USD.
    • Non-Members:  Registration is $748 USD
    • Student Members*: Full conference registration is $150 USD

      Regular Rates - Register between 7/1/16 - 10/31/16

      • Members*:  Registration is $399 USD.
      • Non-Members:  Registration is $798 USD
      • Student Members*: Full conference registration is $150 USD 

      On Site Rates - Register 11/1/16 or later

      • Members*:  Registration is $449 USD.
      • Non-Members:  Registration is $898 USD
      • Student Members*: Full conference registration is $150 USD 
       

       

      Staff can assist you with your group registration of 5 or more attendees. Please contact Leah Lewis for a group discount code. Group discounts are as follows:
      5 or more attendees: 10% off
      10 or more attendees: 20% off

      Please Note: all discount codes are subject to verification. Discounts may be limited to non-member tickets.

      ISSA Cancellation Policy:

      Substitution, cancellation, and refund requests must be submitted in writing and faxed to + 703 435 4390 or emailed to conference@issa.org, Attn: Margaret Jamborsky.
      • For cancellations received through October 15, 2016, you may receive a full refund minus a $50 administrative fee.
      • For cancellations received between October 16, 2016 through November 1, 2016, fifty percent (50%) of the registration fee will be refunded.
      • Cancellations received on or after November 2, 2016 are nonrefundable. No refunds will be granted for nonappearances. 
      • Substitutions are permitted at any time upon written notice from the original registrant.
      • Confirmation of refund request is the responsibility of the attendee.
      • Refunds will be processed no later than November 30, 2016.

      *To access the Member Rate, you must be a dues-paying member of ISSA International in good standing. You must be logged into the ISSA website to access the discounted member rate.

      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### May 2015 - Information Systems Security Association
      Contact Us   |   Print Page   |   Sign In   |   Register
      May 2015


      Breach Report: How Do You Utilize It?


      Click here to view the recorded web conference.
      Click here to view the slide presentation.
      Click here to take the CPE Quiz.
       

      Web Conference Overview:

      Once again, the new data breach reports are being published. The question is, will it be another round of "the sky is falling and the world is ending," or are we, as security professionals, finally succeeding in protecting our assets?

      This year we would like to look at best practices concerning the content of these reports. How do we make the best use of the information that is released? Join our industry experts as they discuss the latest breach reports and provide insight into current trends and even potential solutions.

       

      Moderator and Speakers:

      Moderator:

      Matthew Mosley
      Director of Product Management, Symantec; NOVA Chapter, ISSA Web Conference Committee
      Matt Mosley has been working as a security professional for more than 20 years in roles within corporate IT and risk management, strategic consulting, and product development. In his current role with Symantec, Matt is responsible for product strategy for managed security services. Prior to this role, Matt held senior leadership roles with leading security firms including NetIQ, Internet Security Systems, Intellitactics and Brabeion Software. Matt holds the CISSP, CISM, and CISA designations, teaches CISSP courses for ISSA-NOVA, and is a frequent speaker at security conferences.

      Speakers:

      Larry Ponemon
      Chairman and Founder of Ponemon Institute
      Dr. Larry Ponemon is Chairman and Founder of Ponemon Institute. Because of his expertise in information security and data privacy, he has served on the Advisory Committee for Online Access & Security for the United States Federal Trade Commission and the Data Privacy and Integrity Advisory Committee for the DHS.

      Dr. Ponemon has held chaired faculty positions and written numerous articles and learned books. He has served as founding member of the Certified Information Privacy Professional (CIPP) Advisory Board. Dr. Ponemon has a Ph.D. from Union College and a Master’s degree from Harvard University. He attended the doctoral program in system sciences at Carnegie Mellon University. Dr. Ponemon earned his Bachelors with Highest Distinction from the University of Arizona. He is a CPA and a CIPP.

      Paul Williams
      Chief Technology Officer, White Badger Group
      Paul Williams is the Chief Technology Officer of Pennsylvania-based White Badger Group. Paul has thirty-eight years of breakthrough innovation and invention in cyber security, artificial intelligence, high speed databases, professional software development, software quality test engineering, electronics, communications, mechanical engineering, weapons development and defense related technologies.

      Paul is an expert in rapidly solving complex cyber crime investigations through a variety of innovative and proprietary techniques. Mr. Williams is an active public speaker who attracts large audiences and often draws coverage from radio, television and print media. He conducts scores of high profile cyber-security speaking engagements nationally and internationally every year.

      Over the years Paul has collected a wide assortment of hacking tools, worms, Trojan Horses, and computer viruses for advanced research purposes. He maintains his personal collection of 24,000 computer viruses and 1,700 Trojan Horse programs for advanced research purposes to this day.
       

      Bhavesh Chauhan
      Security Solutions Engineering, Verizon Security Team
      Bhavesh Chauhan joined Verizon, and moved to the United States in October 2010. He has worked in information security for over ten years assisting commercial enterprises with all matters involving IT security and risk management, including accreditation of IT solutions and services for Government agencies. Bhavesh is a public speaker and routinely represents his employer at information security forums for customers and provides regular advice and guidance to large organizations on a global basis.

      Bhavesh holds a Master’s of Science Degree in Physics and holds professional security certifications--CISSP, CISA, and CISM--and has been a certified CLAS1 Consultant approved by CESG to provide Information Assurance (IA) advice to government departments and other organizations, which provided vital services for the United Kingdom from 2001 to 2010.

      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### The ISSA Journal - Information Systems Security Association
      Contact Us   |   Print Page   |   Sign In   |   Register
      The ISSA Journal

       

      Contribute to the Journal:

      Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

      Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

      Interested in being a Friends of Authors mentor? See here for mentor guidance.

      Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

      Meet the ISSA Journal Editorial Advisory Board.

      Digital Archive for Members

      Please click on the following journal issue links for access:
      COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi


      April 2019

      Volume 17 - Issue 4

      Feature articles include:

      • Building a Risk-Based Information Security Culture | Donald A. McKeown
      • Basic Principles of Database Security | John Gray
      • Protecting Information Assets against Insider Threats | T. Sean Kelly and Andrew Shaxted
      • A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques | Liu Hua Yeo, Xiangdong Che, and Shalini Lakkaraju
      • The Python Programming Language | Constantinos Doskas
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - Building a Risk-Based Information Security Culture - at no charge or Join Now and gain full access to the ISSA Journal.


      March 2019

      Volume 17 - Issue 3

      Feature articles include:

      • Application Security, Ethics, & Eight-Year-Olds | Matt Wilgus
      • The Quest for Visibility and Control in the Cloud | Yuri Diogenes
      • Countering Gender Disparity: Creating Anti-Predictions Using Data Science | Lori L. Cole
      • Lost Cryptographics Keys – Lessons from Gerald Cotton | Steve Kirby
      • Anonymous Digital Signatures | Phillip H. Griffin
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - Application Security, Ethics, & Eight-Year-Olds - at no charge or Join Now and gain full access to the ISSA Journal.


      February 2019

      Volume 17 - Issue 2

      Feature articles include:

      • California Dreaming – The Fight with the Federal Government over Technology | David R. Jackson
      • Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization | Philip Casesa
      • SIEM Implementation for School Districts Utilizing FOSS | Alex Smith
      • Automation of Business-Aware Incident Management | Mariusz Stawowski
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - California Dreaming – The Fight with the Federal Government over Technology - at no charge or Join Now and gain full access to the ISSA Journal.


      January 2019

      Volume 17 - Issue 1

      Feature articles include:

      • The Post Exploitation Malware Era | Meir Brown
      • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckler
      • Spoofing a Hardware Security Module | Jeff Stapleton
      • The Art of Pushing Left in Application Security | Kelley Bryant
      • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
      • Practical Approaches to Overcome Security Challenges in Cloud Computing: Part 2: Private Cloud | Seetharaman Jeganathan
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - The Post Exploitation Malware Era - at no charge or Join Now and gain full access to the ISSA Journal.


      December 2018

      Volume 16 - Issue 12

      Feature articles include:

      • The Future of IT Risk Management Will Be Quantified | Jack Freund
      • Our Journey in Phishing Mitigation | Jennifer Kinney and Aurobindo Sundaram
      • The Impact of Cryptocurrency on Modern-Day Cybercrime | Michael Doran
      • Practical Approaches to Overcome Security Challenges in Cloud Computing | Seetharaman Jeganathan
      • Did GDPR Revoke the Digital Certificate? | Jeff Stapleton and Stephen Wu
      • Staring Down the Future of Cloud Computing | Tim O’Neal
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - The Future of IT Risk Management Will Be Quantified - at no charge or Join Now and gain full access to the ISSA Journal.


      November 2018

      Volume 16 - Issue 11

      Feature articles include:

      • Malware: Cat and Mouse Forever? | Ken Dunham
      • Pulling Back the Privacy Curtain | Reg Harnish
      • Holistic Approach to Enhance Your Security Posture | Yuri Diogenes
      • A Look at the Espionage Act of 1917 for the Internet Age | Whitney Partridge and Nima Zahadat
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - Malware: Cat and Mouse Forever? - at no charge or Join Now and gain full access to the ISSA Journal.


      October 2018

      Volume 16 - Issue 10

      Feature articles include:

      • Cloud Cryptography and Key Management | Jeff Stapleton
      • Bookworm: A Threat Hunting Story | Carl Saiyed
      • Cloud Security Due Diligence | Chris Wolski
      • Security Measures That Help Reduce the Cost of a Data Breach | Mangaya Sivagnanam
      • Extracting Timely Sign-in Data from Office 365 Logs | Mark J. Lucas
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - Cloud Cryptography and Key Management - at no charge or Join Now and gain full access to the ISSA Journal.


      September 2018

      Volume 16 - Issue 9

      Feature articles include:

      • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckle
      • The Brave Old New World of Privacy | Steven J. Ross and Robert G. Parker
      • On the Effects of Enterprise Security on Employee Privacy | Amn Rahman and Ashish Gehani
      • The Art of Pushing Left in Application Security | Kelley Bryant
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR - at no charge or Join Now and gain full access to the ISSA Journal.


      August 2018

      Volume 16 - Issue 8

      Feature articles include:

      • Cryptocurrency and Corporate Security | Anthony J. Ferrante and D. Frank Hsu
      • Employee and Insider Data Breaches: Vulnerability or Threat Vector? | Barry S. Herrin
      • The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence | Michael R. Grimaila
      • Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age | Indrajit Atluri
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - Cryptocurrency and Corporate Security - at no charge or Join Now and gain full access to the ISSA Journal.


      July 2018

      Volume 16 - Issue 7

      Feature articles include:

      • Evolution of the Cybersecurity Framework | Alex Grohmann
      • A Multi-Pronged Approach to GDPR Compliance | Mark Shriner
      • Information Security Standards: Differences, Benefits, Impacts, and Evolution } Antonella Commiato and Michael Sturgill
      • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
      • PCAP Next Generation: Is Your Sniffer Up to Snuff? | Scott D. Fether
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - Evolution of the Cybersecurity Framework - at no charge or Join Now and gain full access to the ISSA Journal.


      June 2018

      Volume 16 - Issue 6

      Feature articles include:

      • S/MIME Certificate Management through DNS – DANE: A New Approach | Dena T. Bauckman
      • Rationalizing Behavioral Biometrics | Maria Schuett
      • Spoofing a Hardware Security Module | Jeff Stapleton
      • A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things | Mangaya Sivagnanam
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - S/MIME Certificate Management through DNS – DANE: A New Approach - at no charge or Join Now and gain full access to the ISSA Journal.


      May 2018

      Volume 16 - Issue 5

      Feature articles include:

      • Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information | Sue Wang and Zach Furness
      • Orchestration and Automation in the Real World | Ken Dunham
      • Security Threats, Defenses, and Recommended Practices for Enterprise Mobility | Vincent Sritapan and Karim Eldefrawy
      • Securing a Medical Device | Dave Presuhn and Andrew Bomett
      • Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment | Curtis Campbell
      Members: please click on the following Journal issue links for access:
      Computer: Bluetoad - PDF; Mobile: ePub - Mobi
      Not a member? Read this month's feature article - Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information - at no charge or Join Now and gain full access to the ISSA Journal.



       

      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### August 2017 ISSA Web Conference - Information Systems Security Association August 2017 ISSA International Web Conference
      Contact Us   |   Print Page   |   Sign In   |   Register
      August 2017 ISSA Web Conference


      Untraceable Currency

      Recorded Live, Tuesday, August 22nd, 2017

      Click here to access the recording.
      Click here for a copy of the slides.
      Click here to take the post conference quiz for CPE credits.



      Is the ability to perform anonymous financial transactions a blessing or a curse? Given the world of hackers, ransomware, and cyber criminals, does BitCoin bring more trouble to society then it is worth? This session will discuss what it is, how to use it and its impact on ecommerce, and the potential downsides.



      **Can't attend the live webinar? Register anyway and we'll email you a link to the recording!**


      Moderator:

      Mark Kadrich
      For the past 25 years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. Mr. Kadrich serves as CISO at Antelope Valley Hospital. He holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering.

      Speakers:

      Jean Pawluk
      Jean Pawluk is an Executive Consultant, a Distinguished Fellow of the Information Systems Security Association (ISSA) and honored in 2015 as a Woman of Influence by SC Magazine. Jean developed an interest in security and cryptography developing electronic funds transfer networks for the financial industry and she now is focused on blockchains, augmented reality (AR /VR), & the Internet of Things (IOT). She is active in a number of standards and working groups. She is an initial founding member of the Cloud Security Alliance and currently on the advisory board of several startups.

      Branden Williams
      Branden R. Williams, DBA, CISSP, CISM, is the CTO, Cyber Security Solutions at First Data, a seasoned security executive, and regularly assists top global firms with their information security and technology initiatives. Branden is the author of the Herding Cats feature in the ISSA Journal.

      Gerry McGreevy
      Gerry McGreevy, MBA, MS, CISSP, is a Senior Systems Analyst at Physician Network, MD Anderson Cancer Center in Houston, Texas. Gerry has been active developing various blockchain projects integrating PKI and blockchain architectures. He has completed FinTec Certification (focused in large part on Business Case Analysis for Blockchain) from Massachusetts Institute of Technology.



      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### October CISO Forum Chicago 2015 - Information Systems Security Association
      Contact Us   |   Print Page   |   Sign In   |   Register
      October CISO Forum Chicago 2015



      Theme: Cloud Security Management
      Date: October 10-11, 2015
      Location: Chicago, Illinois

      Public cloud computing gives a company much less control than a private computing environment, yet greater scalability, elasticity, and ease of stand-up and use. Security of cloud usage is possibly one of the biggest reasons that security professionals are concerned about cloud solutions. Yet business users are increasingly using the cloud directly, without involving or notifying IT. Cloud security providers report that the average company uses hundreds of cloud services, while IT or Security is aware of only a fraction of those sites.

      The business is in the cloud. Are you? Have you mapped what cloud-based tools and solutions are enabling your business leaders to achieve their business goals? Do you have policy agreement with business leaders about what should be in-house versus cloud, based on risk? Have you assessed the legal implications of the data that is already in the cloud, or planned to be moved to the cloud? Security professionals must have a good inventory of what their co-workers are doing in the cloud; support what is needed and lobby to remove what is not; and develop a strategic plan for cloud security management of both planned and unplanned cloud usage. How do you assess, how do you monitor, and how do you manage and control your company's cloud footprint? Join your Information Security, Legal and Privacy leadership peers as they come together to discuss these and many other topics related to “Cloud Security Management”.


      Registration:
      ISSA CISO Executive Members: click here to register
      Guests: click here to apply (attendance is subject to approval)

      Venue:
      Chicago Marriott Downtown Magnificent Mile
      Avenue Ballroom/Marriott Ballroom (4th Floor)
      540 North Michigan Avenue
      Chicago, Illinois 60611
      Click here to reserve your room online or by phone by dialing 1-800-228-9290 and mentioning the ISSA Group to get the group discount rate. Reservations at the group discount rate are available until September 29, 2015. Space is limited.

       

      Agenda:

      October 10, 2015


      5:00 p.m. - 8:00 p.m.

      Opening Dinner

      October 11, 2015

       

      8:00 a.m. - 9:00 a.m.

      Registration and Breakfast

      9:00 a.m. - 9:15 a.m.

      Opening Comments and Welcome Address
      Garrett Felix and Ann Seltzer, Q4 2015 CISO Forum Co-chairs

      9:15 a.m. - 10:30 a.m.

      David Foote: Co-Founder, Chief Analyst and Chief Research Officer, Foote Partners LLC

      10:30 a.m. - 11:00 a.m.

      Networking Break

      11:00 a.m. - 12:00 p.m.

      Cloud Security Roundtable Discussion

      12:00 p.m. - 1:15 p.m.

      Lunch

      1:15 p.m. - 2:15 p.m.

      Dan Fitzgerald: VP of Information Security, Uptake

      2:15 p.m. - 2:30 p.m.

      Networking Break

      2:30 p.m. - 3:30 p.m.

      Neal Francom: Assistant CISO, LDS Church

      3:30 p.m. - 3:45 p.m.

      Networking Break

      3:45 p.m. - 4:00 p.m.

      Sponsor Prize Drawing

      4:00 p.m. - 5:00 p.m.

      Pamela Fusco: CISO, Apollo Group

      Robert Wrubel: Former CEO and Founder of Ask Jeeves

      5:00 p.m. - 7:30 p.m.

      ISSA International Conference Opening Reception

       

      Generously Sponsored by:

       opendns.jpg  Pulse-Secure-Logo-Large.jpg  Symantec.JPG
           
           
           

      Questions? Please contact Leah Lewis: 1 866 349 5818 extension 4082.

      For sponsorship opportunities, please contact Joe Cavarretta: 1 866 349 5818 extension 4095.


      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### #####EOF##### December 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference December 2018
      Contact Us   |   Print Page   |   Sign In   |   Register
      December 2018 ISSA Web Conference




      ISSA Thought Leadership Series: 2018 User Risk Report

      Recorded (1 Hour Event) on Wednesday, December 12, 2018

      Click here to view the recording.
      Click here for the presentation.
      Click here to take the CPE quiz.


      Overview:

      We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening.

      We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including:

      • Knowledge of phishing and ransomware

      • Safe use of WiFi, location tracking, and social media

      • Password habits (including password reuse)

      • The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends


       

      Moderator:

      Michael Levin, CEO/Founder, Center for Information Security Awareness

      Michael Levin is a nationally known cyber security professional who spent over twenty-two years in the U.S. Secret Service protecting Presidents and Heads of State. Michael retired from the U.S. Department of Homeland Security - as the Deputy Director of the National Cyber Security Division in Washington DC. He enjoyed a distinguished thirty-year career in public service and law enforcement.
      Michael also served as the Branch Chief of the U.S. Secret Service Electronic Crimes Task Force program in Washington DC, supervising 17 task forces across the country. He worked in the area of computer forensics and cyber-crime investigations for over twenty years. Other assignments included numerous Presidential, Vice Presidential and dignitary protective assignments as well as working at the CIA and NSA as the Secret Service Intelligence Liaison Officer.
      After this distinguished career and seeing the need, Michael founded the Center for Information Security Awareness – www.CFISA.com. The CFISA was created to explore ways to increase cyber security awareness among many audiences, including consumers, employees, businesses and law enforcement. CFISA provides online and on-site cyber security awareness training services to businesses and organizations of all sizes.
      His passion for securing the nation's critical infrastructure has led to his tireless efforts to make cyber security awareness training best practices interesting, meaningful and relevant at home and at work.



      Speakers:

      Gretel Egan, Security Awareness and Training Strategist, Wombat Security, a division of Proofpoint

      Gretel Egan is the Security Awareness and Training Strategist for Wombat Security, a division of Proofpoint. A graduate of Carnegie Mellon University, she has extensive experience in researching and developing cybersecurity education content and was named one of “10 Security Bloggers to Follow” by IDG Enterprise. Gretel has written and provided commentary for national, industry, and trade publications, and has previously presented at events hosted by SecureWorld, Infosecurity Europe, ISACA, SC Media, and others.

      Kelly Robertson, CEO, SEC Consult America

      Kelly Robertson, CISSP, has been an information security practitioner for more than 25 years and is a member of the Silicon Valley chapter of ISSA.
      Kelly is currently CEO of SEC Consult America, a full-service information security consultancy based in Santa Cruz, California.

      Mr. Robertson is an evangelist for cybersecurity awareness, presenting frequently to audiences and corporate organizations. He develops training and education programs for practical risk awareness to benefit people both personally and professionally. Kelly is committed to the enablement of the civil rights for digital citizens to include information security and data privacy.

       

      Richard Bird, Chief Customer Information Officer, Ping Identity

      Richard Bird is the chief customer information officer for Ping Identity. He has spent more than 20 years in corporate business, technology and roles within multiple industries. His diverse background includes serving as the CIO for one of the world's largest hedge fund administrators to being the CISO for a high-tech Swiss analytic device company. Richard's combination of IT operations and security have afforded him the opportunity to be recognized as an expert in identity-centric security, along with many other security domains such as threat and vulnerability management, as well as data and cloud security. An author and frequent speaker on a broad range of cybersecurity topics, Richard is widely recognized as an identity evangelist.



      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### #####EOF##### August 2018 ISSA Web Conference - Information Systems Security Association ISSA Thought Leadership Web Conference August 2018
      Contact Us   |   Print Page   |   Sign In   |   Register
      August 2018 ISSA Web Conference




      ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility

      Recorded (1 Hour Event) on Wednesday, August 8, 2018

      Click here to view the recording.
      Click here for the presentation.
      Click here to take the CPE quiz.


      Overview:

      On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. The ability to locate, manage, and securely update digital certificates on a network or on a device seems like a simple task, yet with the advent of new Enterprise use cases and flourishing IoT device introductions, management at massive scale becomes a challenge. Facing mounting pressures, IT security personnel and product managers are tasked with implementing solutions fit for today’s environment plus tomorrow’s post-quantum world. Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing and the IoT device invasion, crypto-agility:

      · How can crypto-agility lend itself to a truly future-proof Enterprise and IoT device security strategy?
      · Cryptographic kryptonite: demystifying quantum computing
      · Challenges with digital certificate/device management at scale

       

      Moderator:

      Dr. Shawn Murray, Principal Scientist, US Missile Defense Agency & Director, ISSA International

      Dr. Murray is a Principal Scientist at the US Missile Defense Agency and is a Director on the International Board for ISSA International. He has worked with the FBI, CIA, NSA in various rolls supporting cybersecurity initiatives globally. He is also the CEO and Chief Academic Officer for Murray Security Services. He has over 20 years of experience in IT and Cybersecurity.


      Speakers:

      Ted Shorter, Chief Technology Officer, Certified Security Solutions, Inc.

      Ted Shorter is the chief technology officer at Certified Security Solutions, Inc. (CSS). Responsible for CSS’ Intellectual Property development efforts, Ted helps align CSS’ security focus with the changing Enterprise and Internet of Things (IoT) landscape. A renowned Public Key Infrastructure (PKI) expert, Ted has provided oversight to hundreds of private-sector Enterprise PKI deployments, in multiple vertical markets including: Healthcare, Finance, Manufacturing, Aerospace, and e-Commerce. Ted has worked in the security arena for over 25 years, in the fields of cryptography, application security, authentication and authorization services, and software vulnerability analysis. His past experience includes 10 years at the National Security Agency, a Master’s Degree in Computer Science from The Johns Hopkins University, and an active CISSP certification.


      Mike Brown, CTO & Co-Founder, ISARA Corporation

      As ISARA Corporation’s Chief Technology Officer and Co-Founder, Mike Brown is focused on the technical vision and direction for ISARA Corporation.

      Mike was most recently the Vice President of Security Product Management and Research at BlackBerry, where he co-founded the product security practice and was responsible for the vision and execution of security for all BlackBerry products.

      Mike has spoken at global security events including RSA, CTIA, GTEC, Bloomberg, APECTEL and InfoSec Europe. He holds a Master of Mathematics from the University of Waterloo, focusing on cryptography.

       

      Michael Gardiner, Principal Architect, Gemalto

      Michael Gardiner is the Principal Architect in Gemalto’s Enterprise & Cybersecurity CTO Office. In his 12 years with Gemalto, he has been involved in evolving the portfolio to meet the changing market needs. Michael is currently focused on the effects of Quantum computers and Serverless architectures on data protection. Prior to his role at Gemalto, he has been involved with smaller start-up firms.


      Michele Mosca, Founder, Institute for Quantum Computing

      Dr. Mosca is a founder of the Institute for Quantum Computing and Professor at the University of Waterloo.

      He co-founded evolutionQ Inc. and softwareQ Inc., and is globally recognized for his drive to help academia, industry and government prepare our cyber systems to be safe in an era with quantum computers.




      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### 2015 ISSA International Conference Resources - Information Systems Security Association
      Contact Us   |   Print Page   |   Sign In   |   Register
      2015 ISSA International Conference Resources

      Presentations and recordings from the 2015 ISSA International Conference in Chicago

      Click here to read the conference Live Blog

      October 12, 2015

      Opening Keynote Address: Vinton G. Cerf: We are Losing This Battle
      Vice President and Chief Internet Evangelist, Google
      10/12/2015, 9:00 am - 10:00 am, Room Salon 3

      Embracing and Securing the Internet of Things (IoT)
      10/12/2015, 10:00 am - 10:45 am, Room Salon 3
      Track: Infrastructure
      Demetrios Lazarikos: Chief Information Security Officer, vArmour

      The Value Proposition for Federated Digital Identity Services
      10/12/2015, 10:00 am - 10:45 am, Room Kane/McHenry
      Track: Mobile Security
      Stu Vaeth: Senior Vice President, Business Development, SecureKey

      SELinux Integrity Instrumentation (SII)
      10/12/2015, 10:00 am - 10:45 am, Room Lincolnshire 1&2
      Track: Infrastructure
      Mike Libassi: Doctorate Student and Adjunct Professor and Sr. Performance Engineer, Colorado Technical University

      Pathways to Empowered Security Leadership
      10/12/2015, 10:00 am - 10:45 am, Room Northwestern/Ohio State
      Track: Business Skills for the Information Security Professional
      Moderator: Marci McCarthy: President & CEO, T.E.N.
      Panelists:
      Todd Fitzgerald: Global Director Information Security, Grant Thornton International, Ltd
      Larry Lidz: CISO, CNA Insurance
      Jeff Reich: CSO, Barricade
      Richard Rushing: CISO, Motorola

      Silver Bullet for Identifying Hacking and Information Theft in ERP Systems (Audio file)
      10/12/2015, 10:00 am - 10:45 am, Room Purdue/Wisconsin
      Track: Business Skills for the Information Security Professional
      Moshe Panzer: CEO, Xpandion

      Malvertising, Drive-by Downloads, and Web Exploits: Stop Them All with Browser Isolation
      10/12/2015, 10:00 am - 10:45 am, Room Michigan/Michigan State
      Track: Infrastructure
      Ben Strother: Director of Business Development, Spikes Security

      Harnessing Innovation to Address Emerging Security Challenges
      10/12/2015, 10:00 am - 10:45 am, Room Indiana/Iowa
      Track: Incident Response
      Moderator: Dr. Michael C. Redmond, PhD
      Panelists:
      Gautam Aggarwal: Chief Marketing Officer, Bay Dynamics
      Sean Blenkhorn: Senior Director of Solutions Engineering, eSentire, Inc.
      Jack Daniel: Strategist, Tenable Network Security, Inc.
      Kevin Sapp: Vice President, Strategy, Pulse Secure

      Information Security Needs a Reboot
      10/12/2015, 11:00 am - 11:45 am, Room Salon 3
      Track: Business Skills for the Information Security Professional
      Arlan McMillan: CISO – IT Security, Risk, and Compliance, United Airlines

      Engineering Lessons Applied to Cloud Security
      10/12/2015, 11:00 am - 11:45 am, Room Ohare
      Vern Williams: Dell SecureWorks University

      Cisco Annual Security Report
      10/12/2015, 11:00 am - 11:45 am, Room Kane/McHenry
      Track: Mobile Security
      James Natoli: Systems Engineering Manager, Cisco Systems Inc.

      Understanding & Defending Against Data Breaches, as part of a Custom Software Development Process
      Audio File

      10/12/2015, 11:00 am - 11:45 am, Room Indiana/Iowa
      Track: Application Security
      Frank S. Rietta, MSIS: Senior Developer, Rietta Inc.

      Mainframe Security: A Practical Overview
      10/12/2015, 11:00 am - 11:45 am, Room Lincolnshire 1&2
      Track: Infrastructure
      Joe Sturonas: Chief Technology Officer, PKWARE, Inc.

      Patient Portal Security: Ensuring Security & Enhancing Patient Privacy
      10/12/2015, 11:00 am - 11:45 am, Room Northwestern/Ohio State
      Track: Laws and Regulations
      George Bailey: Senior Security Advisor, Purdue Healthcare Advisors

      Making the Business Case for Information Security (Audio File)
      10/12/2015, 11:00 am - 11:45 am, Room Purdue/Wisconsin
      Track: Business Skills for the Information Security Professional
      William Perry: Chief Information Security Officer, California State University Office of the Chancellor

      The Fight Against Phishing: Defining Metrics That Matter
      10/12/2015, 11:00 am - 11:45 am, Room Michigan/Michigan State
      Track: Securing the End Users
      Mark Chapman: President and CEO, Phishline

      CISO Panel Luncheon
      10/12/2015, 12:00 pm – 1:30 pm, Salon 3
      Moderator: Tim Stanley: Risk Management Consultant, Cummins Inc.
      Panelists:
      Mary Ann Davidson: Chief Security Officer, Oracle Corporation
      Joe Filer: Vice President, Chief Information Security Officer, Harland Clarke Holdings Corp.
      Tim Rains: Chief Security Advisor, Microsoft Worldwide Cybersecurity Business Unit.
      Dane Sandersen: Global Security Director, Trek Bicycle Corporation
      Tim Virtue: Chief Information Security Officer, Texas.gov

      ISSA Women in Security SIG Presentation: TAP Into Your Potential
      10/12/2015, 1:45 pm – 2:30 pm, Room O’Hare
      Track: Business Skills for the Information Security Professional
      Jyothi Charyulu: Senior Principal Application Architect, SABRE INC

      It's Not a Cyberwar, It's a Lifestyle
      10/12/2015, 1:45 pm - 2:30 pm, Room Salon 3
      Track: Infrastructure
      Jeff Reich: Chief Security Officer, Barricade

      Preparing for the Big One
      10/12/2015, 1:45 pm - 2:30 pm, Room Lincolnshire 1&2
      Track: Incident Response
      David Phillips: Managing Director, Cybersecurity Consulting, Berkeley Research Group

      Cybersecurity Due Dilligence of a Vendor: Legal Requirements and Beyond
      10/12/2015, 1:45 pm - 2:30 pm, Room Northwestern/Ohio State
      Track: Laws and Regulations
      Marilyn Hanzal: Associate General Counsel, University of Chicago Medical Center
      Rich Skinner: Executive Advisor, S3 Venture Group

      Why Traditional Perimeter Security Approaches Leave your APIs Exposed to Threats (Audio File)
      10/12/2015, 1:45 pm – 2:30 pm, Room Indiana/Iowa
      Track: Application Security
      Sachin Agarwal: Vice President, Product Marketing and Strategy, Akana

      Striking the Right Balance Between Security and User Enablement in Cloud Platforms
      10/12/2015, 1:45 pm – 2:30 pm, Room Purdue/Wisconsin
      Track: Securing the End Users
      Ron Zalkind: CTO and Co Founder, CloudLock

      “Architecting” Your InfoSecurity/Cybersecurity Organization, Teams, and Careers
      10/12/2015, 1:45 pm – 2:30 pm, Room Kane/McHenry
      Track: Business Skills for the Information Security Professional
      David Foote: Co-Founder, Chief Analyst and Chief Research Officer, Foote Partners LLC

      The New Security Stack – 2015–2020
      10/12/2015, 1:45 pm – 2:30 pm, Room Michigan/Michigan State
      Track: Incident Response
      James Brown: Product Manager, OpenDNS

      The Permissions Gap (Audio File)
      10/12/2015, 3:00 pm - 3:45 pm, Room Indiana/Iowa
      Track: Infrastructure
      Lee V. Mangold: Managing Security Engineer, GuidePoint Security

      InfoSec in the Hot Seat: How to Accomplish Breach Response Readiness
      10/12/2015, 3:00 pm - 3:45 pm, Room Lincolnshire 1&2
      Track: Incident Response
      Peter Sloan: Partner, Husch Blackwell LLP
      Rob Rudloff: Partner, RubinBrown LLP

      Preventing, Insuring and Surviving Fund Transfer Fraud
      10/12/2015, 3:00 pm - 3:45 pm, Room Northwestern/Ohio State
      Track: Laws and Regulations
      Nick Merker, CISSP, CIPT: Attorney, Ice Miller LLP
      Nick Reuhs: Attorney, Ice Miller LLP
      Stephen Reynolds, CIPP/US: Partner, Ice Miller LLP

      Diversified IT: Why the Security Workforce Needs Qualified Women...and Men
      Audio File

      10/12/2015, 3:00 pm - 3:45 pm, Room Kane/McHenry
      Track: Business Skills for the Information Security Professional
      Tammy Moskites: CIO and CISO, Venafi

      Security & the Internet of Things
      Audio File

      10/12/2015, 3:00 pm - 3:45 pm, Room Purdue/Wisconsin
      Track: Securing the End Users
      Nich Percoco: Vice President, Strategic Services, Rapid7

       

      October 13, 2015

      Keynote Address: Dan Geer
      CISO, In-Q-Tel
      10/13/2015, 9:00 am – 10:00 am, Salon 3

      The Cyber Threatscape & the Need for Public/Private Partnership
      10/13/2015, 10:15 am – 11:00 am, Room Salon 3
      Arlette Hart: CISO, FBI

      ISSA Women in Security SIG Presentation: Looking to 2020 -- Are we too late?
      10/13/2015, 10:15 am – 11:00 am, Room O’Hare
      Track: Incident Response
      Jill Rhodes: Vice President and Chief Information Security Officer, Trustmark Companies

      The Future of Mobile App Security
      10/13/2015, 10:15 am – 11:00 am, Room Kane/McHenry
      Track: Mobile Security
      Vincent Sritapan: Program Manager for Mobile Security R&D, Department of Homeland Security, S&T – Cyber
      Security Division

      Practical Application Security for the Real World
      10/13/2015, 10:15 am – 11:00 am, Room Indiana/Iowa
      Track: Application Security
      Andrew Leeth: Product Security Engineer, Salesforce

      N-Gram Analysis in Suspect Author Identification of Anonymous Email
      Audio File

      10/13/2015, 10:15 am – 11:00 am, Room Lincolnshire 1&2
      Track: Incident Response
      Paul Herrmann, CISSP, EnCE, CISA, CPP: President, eVestigations Inc.

      Embedded Like a Tick - Cyber Intelligence
      10/13/2015, 10:15 am – 11:00 am, Room Northwestern/Ohio State
      Track: Laws and Regulations
      Jeff Bardin: Chief Intel Officer, Treadstone 71

      Data Classification – Discovery and Response Prioritization
      10/13/2015, 10:15 am – 11:00 am, Room Purdue/Wisconsin
      Track: Securing the End Users
      Tim Plona: Business Solution Architect, Freeport-McMoRan
      Decision Tree


      Build an Adaptive Awareness Program Based on NIST's Cybersecurity Framework
      10/13/2015, 11:15 am – 12:00 pm, Room Michican/Michigan State
      Track: Securing the End Users
      Tom Pendergast: Director of Awareness Solutions, Instructional Design Manager, MediaPro
      Steven Conrad: Managing Director, MediaPro

      Applied Privacy Engineering: User-Controlled, User-Monetized Mobile Advertising
      10/13/2015, 11:15 am – 12:00 pm, Room Kane/McHenry
      Track: Mobile Security
      Kevin O'Neil: CISSP, CYVA Research Corporation

      Medical Device Safety and Security (MeDSS): Assessing and Managing Product Security Risk
      10/13/2015, 11:15 am – 12:00 pm, Room Indiana/Iowa
      Track: Application Security
      John Lu: Principal, Cyber Risk Services, Life Sciences and Healthcare industry, Deloitte & Touche LLP
      Muhammad Kashif: Manager, Cyber Risk Services, Life Sciences and Healthcare industry, Deloitte & Touche LLP

      Taking Control of ‘Control’: Addressing Cybersecurity in Industrial Control Systems
      Audio File

      10/13/2015, 11:15 am – 12:00 pm, Room Lincolnshire 1&2
      Track: Infrastructure
      Daniel Ziesmer: ISSO, Bechtel Corporation

      Stake Your Reputation on your Cyber Security Incident Response Program CSIRT
      10/13/2015, 11:15 am – 12:00 pm, Room Northwestern/Ohio State
      Track: Incident Response
      Dr. Michael C. Redmond: CEO and Lead Consultant, Redmond Worldwide

      How to be a highly effective CISO - Top 10 Performance Success Factors!
      10/13/2015, 11:15 am – 12:00 pm, Room Purdue/Wisconsin
      Track: Business Skills for the Information Security Professional
      Brian Schultz, CISSP, ISSMP, ISSAP, CISM, CISA: Technical Director, Cyber Architecture and Advisory Services,
      Battelle
      Bob Bigman: President, 2BSecure

      Cyber Security Liability Insurance: Need It or Leave It
      10/13/2015, 11:15 am – 12:00 pm, Room O’Hare
      Track: Laws and Regulations
      Moderator: Andrea Hoy: President, ISSA
      Panelists:
      Ronald Raether: Partner, Troutman Sanders
      Brian Thornton: President, ProWriters

      Intelligent Risk in a House Without Walls
      10/13/2015, 11:15 am – 12:00 pm, Room Michigan/Michigan State
      Track: Threats & Responses
      Ryan DuPre: Symantec

      2015 Verizon Data Breach Investigation Report
      10/13/2015, 1:45 pm - 2:30 pm, Room Salon 3
      Track: Incident Response
      Dave Ostertag: Global Investigations Manager, Risk Team, Verizon

      Security or Convenience? Enabling a Collaborative Work Environment
      10/13/2015, 1:45 pm - 2:30 pm, Room Kane/McHenry
      Track: Application Security
      Guy Bunker: Senior Vice President of Products, Clearswift

      Let's Hack a House (Audio File)
      10/13/2015, 1:45 pm - 2:30 pm, Room Lincolnshire 1&2
      Track: Infrastructure
      Tony Gambacorta: Vice President, Operations, Synack

      Current Trends and Our Methods for Defense
      10/13/2015, 1:45 pm - 2:30 pm, Room Northwestern/Ohio State
      Track: Laws and Regulations
      Adam Keown: Security Consultant / Solutions Architect, TEKsytems

      Computer Security for SMB/Gov’t
      10/13/2015, 1:45 pm - 2:30 pm, Room Purdue/Wisconsin
      Track: Securing the End Users
      Marv Stein: Sr. Security Consultant, TDAmeritrade

      Preventing the Inevitable - Safeguarding Critical Assets in the Age of the Mega-Breach
      10/13/2015, 1:45 pm - 2:30 pm, Room Michigan/Michigan State
      Track: Business Skills for the Information Security Professional
      Robert Eggebrecht: Co-Founder, President, and Chief Executive Officer, InteliSecure

      Information Security Beyond Tools and Toys: How Do We Advance the Culture Side of It?
      10/13/2015, 1:45 pm - 2:30 pm, Room Indiana/Iowa
      Track: Securing the End Users
      Moderator: Sali Osman: Chairperson, Mentor-Protégé Committee, International Consortium of Minority Cybersecurity Professionals
      Panelists:
      Stephen Cobb: Sr. Security Researcher: ESET North America
      Tyler Cohen Wood: Cyber Security Advisor, Inspired eLearning
      Jamison Utter: Senior Consulting Engineer, Security, Infoblox

      Securing our Future: Lessons From the Human Immune System
      10/13/2015, 3:00 pm – 3:45 pm, Room Michigan/Michigan State
      Track: Incident Response
      Jeff Hudson: CEO, Venafi

      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### October CISO Forum Dallas, TX 2019 - Information Systems Security Association
      Contact Us   |   Print Page   |   Sign In   |   Register
      October CISO Forum Dallas, TX 2019


      Theme  |  Registration  |  Hotel Reservations & Transportation  |  Agenda  |  Sponsors


      Security Metrics
      Date: September 30-October 1, 2019
      Location: Dallas, TX

      TBD

       

      Registration:

      Type Fees and Benefits Registration Link
      ISSA CISO Executive Members

      Complimentary meeting registration and one complimentary night of hotel accommodations*

      click here to register

      learn about CISO Executive Membership here
      First Time Guests Complimentary meeting registration click here to apply
      (attendance is subject to approval)
      Returning Guests $400 click here to apply**
      (attendance is subject to approval)

      *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

      **Upon verification of eligibility, guest will be invoiced for the $400 registration fee

       

      Hotel:

      Venue:
      Omni Mandalay Hotel at Las Colinas
      221 Las Colinas Blvd.
      Irving, TX. 75039

      Click here to reserve your room at the Omni Mandalay Hotel at Las Colinas. The daily rate is $173 plus resort fee and state and local taxes. Reservations are available until September 13, 2019 or until the block sells out, whichever comes first. Space is limited.

      Transportation:
      New to Uber? Join here to earn up to $15 off your first ride!

       

      Agenda:

      September 30, 2019


      5:00 p.m. - 8:00 p.m.

      Opening Dinner
      Presentation: TBD

      October 1, 2019

       

      8:00 a.m. - 8:50 a.m.

      Registration and Breakfast

      8:50 a.m. - 9:15 a.m.

      Opening Comments and Welcome Address

      9:15 a.m. - 10:15 a.m.

      Presentation: TBD
      Name:

      10:15 a.m. - 10:45 a.m.

      Networking Break

      10:45 a.m. - 11:45 p.m.

      Presentation: TBD

      Name: 

      11:45 a.m. - 12:00 p.m.  Wisegate

      12:00 p.m. - 1:00 p.m.

      Lunch

      1:00 p.m. - 2:00 p.m.

      Presentation: TBD
      Name:

      2:00 p.m. - 3:00 p.m. Presentation: TBD
      Name:

      3:00 p.m. - 3:30 p.m.

      Networking Break

      3:30 p.m. - 5:00 p.m.

      Presentation: TBD
      Name:
       

      5:00 p.m. - 5:15 p.m.

      Sponsor Prize Drawing

      5:15 p.m. - 6:15 p.m.

      Closing Reception


      Questions? Please contact
       Member Services: +1 (703) 382-8205 (local/international)

       

      Sponsors:

      For sponsorship opportunities, please contact  Sean Bakke.





            

         
      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### February CISO Forum San Francisco 2016 - Information Systems Security Association
      Contact Us   |   Print Page   |   Sign In   |   Register
      February CISO Forum San Francisco 2016



      Theme: Innovation and Technology
      Date: February 27-28, 2016
      Location: San Francisco, California

      In a theater of evolving data breaches and cyber attacks, it is vital to empower organizations with strategies and solutions to protect against the next new wave of threats. The demand of C-Suite executives and boards to protect corporate and customer networks and data is the driving force behind new, innovative technologies and rapidly increasing investments in cybersecurity startups. Companies and venture capital firms are pouring millions of dollars into dozens of cybersecurity companies each year, all for the purpose of security. The February ISSA CISO Executive Forum in San Francisco will focus on current innovations and trends surrounding the cybersecurity landscape and how both governmental and private organizations are collectively aiming for solutions. Hear how the FBI, venture capital firms, and other organizations are working jointly on innovation and technology.

      Registration:

      Type Fees and Benefits Registration Link
      ISSA CISO Executive Members

      Complimentary meeting registration and one complimentary night of hotel accommodations* 

      click here to register 

      learn about CISO Executive Membership here
      First Time Guests Complimentary meeting registration click here to apply 
      (attendance is subject to approval)
      Returning Guests $400 click here to apply** 
      (attendance is subject to approval)

       *CISO Member is responsible for making his or her own hotel reservations. Reservations must be made at the host hotel in the ISSA room block to qualify for complimentary one (1) night lodging.

      **Upon verification of eligibility, guest will be invoiced for the $400 registration fee

      Venue:
      Marines Memorial Club and Hotel
      609 Sutter Street
      San Francisco, California 94102


      Transportation:
      New to Uber? Join here to earn up to $15 off your first ride!

      Agenda:

      February 27, 2016


      5:00 p.m. - 8:00 p.m.

      Opening Dinner Keynote
      Christopher Key
      Co-Founder, CEO, and Acting CISO, Verodin Inc.


      February 28, 2016

       

      8:00 a.m. - 8:45 a.m.

      Registration and Breakfast

      8:45 a.m. - 9:15 a.m.

      Opening Comments and Welcome Address

      9:15 a.m. - 10:15 a.m.

      Opening Speaker
      Marty Roesch
      Vice President and Chief Architect, Cisco Security Business Group  

      10:15 a.m. - 10:45 a.m.

      Networking Break

      10:45 a.m. - 12:15 p.m.

      Venture Capitalist Panel

      Moderator: Demetrios Lazarikos: CISO, vArmour
      Panelists:
           Charles Beeler:  General Partner, Rally Ventures

           JC Raby: Co-Founder and Partner, Boston Meridian LLC

           Rama Sekhar: Partner, Norwest Venture Partners

      12:15 p.m. - 1:15 p.m.

      Lunch

      1:15 p.m. - 2:15 p.m.

      Afternoon Speaker
      Craig Rosen
      Vice President and Chief Security Officer, FireEye

      2:15 p.m. - 2:30 p.m.

      Networking Break

      2:30 p.m. - 3:30 p.m.

      Afternoon Speaker
      Scott Borg
      Director (CEO) and Chief Economist, U.S. Cyber Consequences Unit

      3:30 p.m. - 3:45 p.m.

      Networking Break

      3:45 p.m. - 4:00 p.m.

      Sponsor Prize Drawing

      4:00 p.m. - 5:00 p.m.

      Closing Speaker
      Jamil Hassani
      FBI San Francisco

      5:00 p.m. - 6:00 p.m.

      Closing Reception

       

      This CISO Executive Forum Is Sponsored by:

            BlueTalon-Logo-Small.png  DT_logo_onwhite_noBG.PNG
                          Verodin_FrontHorz_Logo_Tagli.png
             

       

       

       


      Questions? Please contact
       Leah Lewis: 1 866 349 5818 extension 4082.

      For sponsorship opportunities, please contact Joe Cavarretta: 1 866 349 5818 extension 4095.


      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### October 2018 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference October 2018
      Contact Us   |   Print Page   |   Sign In   |   Register
      October 2018 ISSA Web Conference




      ISSA Thought Leadership Series: Security Event Overload-How to Net it Out

      Recorded (2 Hour Event) on Wednesday, October 10, 2018

      Click here to view the recording.
      Click here for the presentation.
      Click here to take the CPE quiz.


      Overview:

      How do you manage the thousands or tens of thousands of security alerts that are generated by your systems each day? Hear about strategies from practitioners who are dealing with “event overload” and then listen to a follow-up with a discussion about how security products that are building actionable information into their reporting in order to ease the burden.


       

      Moderator:

      Steve Tcherchian, CISO & Director of Product Management, XYPRO Techology

      Steve Tcherchian, CISSP, PCI-ISA, PCIP is the Chief Information Security Officer and the Director of Product Management for XYPRO Technology. Steve is on the ISSA CISO Advisory Board, the NonStop Under 40 executive board and part of the ANSI X9 Security Standards Committee. With almost 20 years in the cybersecurity field, Steve is responsible for strategy and innovation of XYPRO’s security product line as well as overseeing XYPRO’s risk, compliance and security to ensure the best experience to customers in the Mission-Critical computing marketplace.




      Speakers:

      Robert Hamilton, Director, Product Marketing, Imperva

      Robert Hamilton is Director, Product Marketing for Imperva application security product lines. Robert’s background includes over 20 years of experience in product management and marketing in the server, storage and security markets with positions at HP, NetApp, RSA and Symantec.

       

      Shelly Hershkovitz, Product Manager, Application Security Insights, Imperva

      Shelly Hershkovitz is the Product Manager for Application Security Insights at IMPERVA. She leads the Attack Analytics and Threat Intelligence products. In the last twelve years,Shelly has focused on machine learning, computer vision, and security research across multiple functions including research team leader and product management. Shelly holds a BA in Computer Science & Masters degree in Bio-Medical Engineering.


      Scott McCoy, IT Director, Medtronic

      R. Scott McCoy has managed risk professionally since he became an Explosive Ordnance Disposal technician in the US Army in 1984. His career in Corporate Security started in 1988 while he worked his way through college. By 2002, he became the director of security for Xcel Energy. While helping to draft the first cyber security standards for the electric sector, he created Xcel Energy’s first IT Security department that was also responsible for Business Continuity and Disaster Recovery and attained the CPP, CISSP and CBCP certifications. In 2007, he became the CSO of ATK, a defense and aerospace company and created their first IT Security program and SOC for the corporate network. In 2012, he moved to Thomson Reuters as the VP, Head of Enterprise Security Services and created, recruited and led the teams for Threat and Vulnerability Management, Customer Assurance and Vendor Risk Management and assisted in building out their first SOC. He is currently responsible for the SOC and CSIRT teams at Medtronic.

       

      Jessica Doyle, Director of Threat Assessment, Optiv

      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF##### March 2019 ISSA Web Conference - Information Systems Security Association ISSA International Web Conference March 2019
      Contact Us   |   Print Page   |   Sign In   |   Register
      March 2019 ISSA Web Conference




      ISSA International Series: Threat Detection - Trends and Technology

      Recorded (2 Hour Event) on Tuesday, March 26, 2019

      Click here to view the recording.
      Click here for the presentation.
      Click here to take the CPE quiz.


      Overview:



       

      Moderator:

      Gabe Chomic, President, ISSA-UK

      Gabe is a technologist at heart who has been tinkering from an early age. In addition to running ISSA-UK, he has worked in 14 countries and across numerous sectors, bootstrapped a cloud cryptocurrency crowdfunding platform into profitability, built security programs from the ground up, led multi-million pound security service transitions and performed in-depth security engineering in SCADA environments. His current passions involve security economics, shifting security left, and the changing perception of information security in both business and the public eye.


      Speakers:

      Mohan Rao, CTO, RANK Software

      Mohan is the Chief Technical Officer at RANK Software Inc. RANK is a Security Analytics company based out of Toronto, Canada. RANK makes Cybersecurity Simple, Accurate and Actionable. We analyze billions of events in near real-time to identify both internal and external threats. Our predictive modeling systems identify high risk user, machine and application behavior before they become a threat.

      He managed a Billion dollar Fulfillment Business at Amazon. Responsible for optimization algorithms, scaling (10s of billions of events per day) and availability of Amazon’s Global Fulfillment Platform – including Robotic systems. Site Leader for Amazon’s Toronto development center.

      Mohan has also built and managed Contextual Systems and Mobile Advertising at BlackBerry (Research in Motion). Introduced Big Data technologies at BlackBerry, forged vendor partnerships and managed Software Development teams across 3 countries.

        

      Brian Laing, SVP, Corporate Development & Strategic Alliances, Lastline

      For more than 20 years, Brian Laing has shared his strategic business vision and technical leadership with a range of start-ups and established companies in various executive level roles. The author of “APT for Dummies,” Brian was previously vice president of AhnLab, where he directed the US operations of the internationally known security and software leader. He founded Hive Media and served as CEO. As the co-founder of RedSeal Systems, Brian conceived of the overall design and features of the product and was granted two patents related to network security. Brian was also founder and CEO of self-funded Blade Software that released the industry’s first commercial IPS/FW testing tool.

       

      Thomas Fischer, Security Advocate and Threat Researcher

      Thomas has over 30 years of experience in the IT industry ranging from software development to infrastructure & network operations and architecture to settle in information security. He has an extensive security background covering roles from incident responder to security architect at fortune 500 companies, vendors and consulting organizations. He is currently security advocate and threat researcher focused on advising companies on understanding their data protection activities against malicious parties not just for external threats but also compliance instigated.

      Thomas is also an active participant in the InfoSec community not only as a member but also as director of Security BSides London, ISSA UK chapter board member and speaker at events like SANS DFIR EMEA, DeepSec, Shmoocon, and various BSides events.


      Community Search
      Sign In


      Calendar

      4/10/2019
      ISSA Thought Leadership Series: High Assurance Digital Identity in Zero Trust Architecture

      4/17/2019
      Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle

      5/7/2019
      4th Annual Healthcare Cybersecurity Summit

      5/16/2019
      ISSA of Wisconsin - Annual Meeting and Conference

      6/13/2019 » 6/14/2019
      June CISO Executive Forum Boston, MA





      Copyright © 2016, Information Systems Security Association, All Rights Reserved
      Privacy Policy │ Copyright Information
      #####EOF#####